Updates released on Wednesday for the Ubuntu operating system address several vulnerabilities in the Linux kernel, including ones that can be exploited for denial-of-service (DoS) attacks and arbitrary code execution.
A total of eight Linux kernel vulnerabilities have been patched in various Ubuntu 14 and 15 variants, including Utopic Unicorn, Wily Werewolf, Trusty Tahr and the Raspberry Pi 2 version.
Four of these vulnerabilities have been found to affect Ubuntu 14.04 LTS (long term support). One of them is a use-after-free flaw in the CXGB3 kernel driver (CVE-2015-8812) that can be exploited by a local attacker to crash the system and possibly even execute arbitrary code.
The issue, reported by Venkatesh Pottem of Red Hat Engineering, is triggered when the network is congested.
Another vulnerability patched by Ubuntu was discovered by Xiaofei Rex Guo. He discovered that an attacker could disrupt the integrity of the system by exploiting a timing side channel vulnerability in the Linux Extended Verification Module (EVM). The flaw has been assigned the identifier CVE-2016-2085.
A DoS vulnerability, tracked as CVE-2016-2550, has been identified by David Herrmann. The security hole allows a local, unauthenticated attacker to exhaust resources and cause a DoS condition due to the fact that the kernel incorrectly accounts file descriptors to the original opener for in-flight file descriptors sent over a Unix domain socket.
Another resource exhaustion issue patched by Ubuntu has been found by Tetsuo Handa. Handa discovered that the kernel did not enforce limits on the amount of data allocated to buffer pipes (CVE-2016-2847).
The vulnerabilities addressed by Ubuntu have also been fixed in Debian. Some of them also affect Red Hat products, but Red Hat has classified them as having low or medium severity and has yet to release patches.
In January, Israel-based security startup Perception Point reported discovering a local privilege escalation vulnerability in the Linux kernel that exposed tens of millions of Linux PCs and servers. The flaw, found in version 3.8 and later of the Linux kernel, allows an attacker to achieve kernel code execution and gain root privileges on the targeted system.
Related: Multipurpose “Xunpes” Trojan Targeting Linux Systems
Related: Password Bypass Flaw Found in GRUB2 Linux Bootloader

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- New York Man Arrested for Running BreachForums Cybercrime Website
- Exploitation of Recent Fortinet Zero-Day Linked to Chinese Cyberspies
- Mozilla Patches High-Severity Vulnerabilities With Release of Firefox 111
- Microsoft: 17 European Nations Targeted by Russia in 2023 as Espionage Ramping Up
- Cybercriminals, APT Exploited Telerik Vulnerability in Attacks on US Government Agency
- US Charges Two Men Over Use of Hacked Law Enforcement Database for Doxing
Latest News
- Aembit Scores $16.6M Seed Funding for Workload IAM Technology
- Millions Stolen in Hack at Cryptocurrency ATM Manufacturer General Bytes
- Waterfall Security, TXOne Networks Launch New OT Security Appliances
- Hitachi Energy Blames Data Breach on Zero-Day as Ransomware Gang Threatens Firm
- NBA Notifying Individuals of Data Breach at Mailing Services Provider
- Adobe Acrobat Sign Abused to Distribute Malware
- New York Man Arrested for Running BreachForums Cybercrime Website
- Huawei Has Replaced Thousands of US-Banned Parts With Chinese Versions: Founder
