First published: Wed Feb 22 2017(Updated: )
It was discovered that a use-after-free vulnerability existed in the block device layer of the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2016-7910) Dmitry Vyukov discovered a use-after-free vulnerability in the sys_ioprio_get() function in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2016-7911) Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. (CVE-2017-6074)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-3.2.0-1501-omap4 | <3.2.0-1501.128 | 3.2.0-1501.128 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-powerpc-smp | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-powerpc64-smp | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-generic-pae | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-highbank | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-generic | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-omap4 | <3.2.0.1501.96 | 3.2.0.1501.96 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-virtual | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-generic-pae | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-highbank | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-powerpc-smp | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-virtual | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-powerpc64-smp | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-omap | <3.2.0.123.138 | 3.2.0.123.138 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 | |
All of | ||
ubuntu/linux-image-3.2.0-123-omap | <3.2.0-123.166 | 3.2.0-123.166 |
Ubuntu gir1.2-packagekitglib-1.0 | =12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Linux kernel vulnerability is CVE-2016-7910.
The severity of CVE-2016-7910 is high.
CVE-2016-7910 can be exploited by a local attacker to cause a denial of service or possibly gain administrative privileges.
Ubuntu version 12.04 with the Linux kernel versions 3.2.0-1501.128, 3.2.0.123.138, 3.2.0-123.166, 3.2.0-123.166, 3.2.0-123.166, 3.2.0-123.166, 3.2.0.1501.96, 3.2.0-123.166, 3.2.0.123.138, 3.2.0.123.138, 3.2.0.123.138, 3.2.0-123.166, 3.2.0.123.138, 3.2.0.123.138, 3.2.0-123.166, 3.2.0.123.138, 3.2.0.123.138, 3.2.0.123.138, 3.2.0.123.138, 3.2.0.123.138 are affected by CVE-2016-7910.
To mitigate the CVE-2016-7910 vulnerability on Ubuntu 12.04, update the Linux kernel to version 3.2.0-1501.128 or later.