Canonical fixes six Ubuntu 15.10 and 14.04 kernel Vulnerabilities
In April 6, Canonical released Kernel updates for Ubuntu 15.10 (Wily Werewolf), Ubuntu 15.10 for Raspberry Pi 2, and Ubuntu 14.04 LTS (Trusty Tahr) systems, this Kernel update fixes six known and newly discovered Linux Kernel vulnerabilities.
A total of six Linux kernel vulnerabilities are mentioned in the latest security notice of Canonical, four of which affect the Ubuntu 14.04 LTS system. The first vulnerability lies in the CXGB3 driver in Linux Kernel, which allows local attackers to cause system crashes, resulting in DoS or code execution.
The second security vulnerability lies in the Linux Kernel EVM (extended verification module) component. if attacked, system integrity will be affected. The third problem lies in the cache restriction allocated to the "Pipeline" by Linux Kernel, which can be exploited by local attackers to perform DoS attacks. The fourth security problem affects both Ubuntu 15.10 and Ubuntu 14.04 LTS systems. Security personnel found that Linux Kernel occupied the file descriptor originally opened using UNIX Socket, this may allow local attackers to initiate DoS attacks.
Only the Ubuntu15.10 issue is affected.
The fifth and sixth kernel vulnerabilities mentioned in the Security Bulletin only affect the Ubuntu 15.10 and Ubuntu 15.10 for Raspberry Pi 2 systems. One of these vulnerabilities is found in the Linux kernel USB vision driver, it will generate an incorrect health check report for endpoints and interfaces, allowing attacks to cause physical crashes.
The second vulnerability was found in the Berkeley Packet Filter (eBPF) Section of Linux kernel, allowing local attackers to perform DoS attacks or execute code.
Ubuntu users should update the kernel immediately at the appropriate time. After the update is completed, the system needs to be restarted.