Linux kernel (Qualcomm Snapdragon) vulnerabilities


## Releases * Ubuntu 16.04 ESM ## Packages * linux-snapdragon \- Linux kernel for Snapdragon Processors Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB Generic Receive Offload (GRO) processing implementations in the Linux kernel, A remote attacker could use this to cause a stack corruption, leading to a denial of service (system crash). (CVE-2016-7039) Marco Grassi discovered a use-after-free condition could occur in the TCP retransmit queue handling code in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-6828) Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller driver in the Linux kernel when handling ioctl()s. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-6480)

Affected Package

OS OS Version Package Name Package Version
Ubuntu 16.04 linux-image-4.4.0-1030-snapdragon 4.4.0-1030.33
Ubuntu 16.04 linux-headers-4.4.0-1012-snapdragon 4.4.0-1030.33
Ubuntu 16.04 linux-image-4.4.0-1012-snapdragon 4.4.0-1030.33
Ubuntu 16.04 linux-image-4.4.0-1012-snapdragon-dbgsym 4.4.0-1030.33
Ubuntu 16.04 linux-snapdragon-headers-4.4.0-1012 4.4.0-1030.33
Ubuntu 16.04 linux-snapdragon-tools-4.4.0-1012 4.4.0-1030.33
Ubuntu 16.04 linux-snapdragon-tools-4.4.0-1012-dbgsym 4.4.0-1030.33
Ubuntu 16.04 linux-tools-4.4.0-1012-snapdragon 4.4.0-1030.33