Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Ubuntu Patches Several Kernel Vulnerabilities

Updates released on Wednesday for the Ubuntu operating system address several vulnerabilities in the Linux kernel, including ones that can be exploited for denial-of-service (DoS) attacks and arbitrary code execution.

Updates released on Wednesday for the Ubuntu operating system address several vulnerabilities in the Linux kernel, including ones that can be exploited for denial-of-service (DoS) attacks and arbitrary code execution.

A total of eight Linux kernel vulnerabilities have been patched in various Ubuntu 14 and 15 variants, including Utopic Unicorn, Wily Werewolf, Trusty Tahr and the Raspberry Pi 2 version.

Four of these vulnerabilities have been found to affect Ubuntu 14.04 LTS (long term support). One of them is a use-after-free flaw in the CXGB3 kernel driver (CVE-2015-8812) that can be exploited by a local attacker to crash the system and possibly even execute arbitrary code.

The issue, reported by Venkatesh Pottem of Red Hat Engineering, is triggered when the network is congested.

Another vulnerability patched by Ubuntu was discovered by Xiaofei Rex Guo. He discovered that an attacker could disrupt the integrity of the system by exploiting a timing side channel vulnerability in the Linux Extended Verification Module (EVM). The flaw has been assigned the identifier CVE-2016-2085.

A DoS vulnerability, tracked as CVE-2016-2550, has been identified by David Herrmann. The security hole allows a local, unauthenticated attacker to exhaust resources and cause a DoS condition due to the fact that the kernel incorrectly accounts file descriptors to the original opener for in-flight file descriptors sent over a Unix domain socket.

Another resource exhaustion issue patched by Ubuntu has been found by Tetsuo Handa. Handa discovered that the kernel did not enforce limits on the amount of data allocated to buffer pipes (CVE-2016-2847).

The vulnerabilities addressed by Ubuntu have also been fixed in Debian. Some of them also affect Red Hat products, but Red Hat has classified them as having low or medium severity and has yet to release patches.

Advertisement. Scroll to continue reading.

In January, Israel-based security startup Perception Point reported discovering a local privilege escalation vulnerability in the Linux kernel that exposed tens of millions of Linux PCs and servers. The flaw, found in version 3.8 and later of the Linux kernel, allows an attacker to achieve kernel code execution and gain root privileges on the targeted system.

Related: Multipurpose “Xunpes” Trojan Targeting Linux Systems

Related: Password Bypass Flaw Found in GRUB2 Linux Bootloader

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this event as we dive into threat hunting tools and frameworks, and explore value of threat intelligence data in the defender’s security stack.

Register

Learn how integrating BAS and Automated Penetration Testing empowers security teams to quickly identify and validate threats, enabling prompt response and remediation.

Register

People on the Move

Shane Barney has been appointed CISO of password management and PAM solutions provider Keeper Security.

Edge Delta has appointed Joan Pepin as its Chief Information Security Officer.

Vats Srivatsan has been appointed interim CEO of WatchGuard after Prakash Panjwani stepped down.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.