USN-3146-2: Linux kernel (Xenial HWE) vulnerabilities
Medium
Canonical Ubuntu
It was discovered that the __get_user_asm_ex
implementation in the Linux kernel for x86/x86_64 contained extended asm
statements that were incompatible with the exception table. A local attacker could use this to gain administrative privileges. (CVE-2016-9644)
Andreas Gruenbacher and Jan Kara discovered that the filesystem implementation in the Linux kernel did not clear the setgid
bit during a setxattr
call. A local attacker could use this to possibly elevate group privileges. (CVE-2016-7097)
Marco Grassi discovered that the driver for Areca RAID Controllers in the Linux kernel did not properly validate control messages. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-7425)
Daxing Guo discovered a stack-based buffer overflow in the Broadcom IEEE802.11n FullMAC driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-8658)
Severity is medium unless otherwise noted.
Cloud Foundry BOSH stemcells are vulnerable, including:
All other unmaintained versions are potentially vulnerable.
OSS users are strongly encouraged to follow one of the mitigations below:
The Cloud Foundry project recommends upgrading to the following BOSH stemcells:
Marco Grassi, Andreas Gruenbacher, Daxing Guo, and Jan Kara