vulnerability
Ubuntu: (Multiple Advisories) (CVE-2016-8645): Linux kernel vulnerabilities
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:L/AC:L/Au:N/C:N/I:N/A:C) | Nov 27, 2016 | Dec 21, 2016 | Mar 27, 2026 |
Severity
5
CVSS
(AV:L/AC:L/Au:N/C:N/I:N/A:C)
Published
Nov 27, 2016
Added
Dec 21, 2016
Modified
Mar 27, 2026
Description
The TCP stack in the Linux kernel before 4.8.10 mishandles skb truncation, which allows local users to cause a denial of service (system crash) via a crafted application that makes sendto system calls, related to net/ipv4/tcp_ipv4.c and net/ipv6/tcp_ipv6.c.
Solutions
ubuntu-upgrade-linux-image-3-13-0-119-genericubuntu-upgrade-linux-image-3-13-0-119-generic-lpaeubuntu-upgrade-linux-image-3-13-0-119-lowlatencyubuntu-upgrade-linux-image-3-13-0-119-powerpc-e500ubuntu-upgrade-linux-image-3-13-0-119-powerpc-e500mcubuntu-upgrade-linux-image-3-13-0-119-powerpc-smpubuntu-upgrade-linux-image-3-13-0-119-powerpc64-smpubuntu-upgrade-linux-image-4-4-0-1038-raspi2ubuntu-upgrade-linux-image-4-4-0-1042-snapdragonubuntu-upgrade-linux-image-4-4-0-57-genericubuntu-upgrade-linux-image-4-4-0-57-generic-lpaeubuntu-upgrade-linux-image-4-4-0-57-lowlatencyubuntu-upgrade-linux-image-4-4-0-57-powerpc-e500mcubuntu-upgrade-linux-image-4-4-0-57-powerpc-smpubuntu-upgrade-linux-image-4-4-0-57-powerpc64-embubuntu-upgrade-linux-image-4-4-0-57-powerpc64-smpubuntu-upgrade-linux-image-4-8-0-1021-raspi2ubuntu-upgrade-linux-image-4-8-0-32-genericubuntu-upgrade-linux-image-4-8-0-32-generic-lpaeubuntu-upgrade-linux-image-4-8-0-32-lowlatencyubuntu-upgrade-linux-image-4-8-0-32-powerpc-e500mcubuntu-upgrade-linux-image-4-8-0-32-powerpc-smpubuntu-upgrade-linux-image-4-8-0-32-powerpc64-embubuntu-upgrade-linux-image-genericubuntu-upgrade-linux-image-generic-lpaeubuntu-upgrade-linux-image-generic-lpae-lts-xenialubuntu-upgrade-linux-image-generic-lts-xenialubuntu-upgrade-linux-image-lowlatencyubuntu-upgrade-linux-image-lowlatency-lts-xenialubuntu-upgrade-linux-image-powerpc-e500ubuntu-upgrade-linux-image-powerpc-e500mcubuntu-upgrade-linux-image-powerpc-e500mc-lts-xenialubuntu-upgrade-linux-image-powerpc-smpubuntu-upgrade-linux-image-powerpc-smp-lts-xenialubuntu-upgrade-linux-image-powerpc64-embubuntu-upgrade-linux-image-powerpc64-emb-lts-xenialubuntu-upgrade-linux-image-powerpc64-smpubuntu-upgrade-linux-image-powerpc64-smp-lts-xenialubuntu-upgrade-linux-image-raspi2ubuntu-upgrade-linux-image-snapdragon
References
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.