Medium
VendorCanonical Ubuntu
Versions Affected Canonical Ubuntu 14.04 LTS DescriptionIt was discovered that the __get_user_asm_ex implementation in the Linux kernel for x86/x86_64 contained extended asm statements that were incompatible with the exception table. A local attacker could use this to gain administrative privileges. (CVE-2016-9644)
Andreas Gruenbacher and Jan Kara discovered that the filesystem implementation in the Linux kernel did not clear the setgid bit during a setxattr call. A local attacker could use this to possibly elevate group privileges. (CVE-2016-7097)
Marco Grassi discovered that the driver for Areca RAID Controllers in the Linux kernel did not properly validate control messages. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-7425)
Daxing Guo discovered a stack-based buffer overflow in the Broadcom IEEE802.11n FullMAC driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-8658)
Affected Cloud Foundry Products and VersionsSeverity is medium unless otherwise noted.
Cloud Foundry BOSH stemcells are vulnerable, including:
All versions prior to 3151.5 3233.x versions prior to 3233.6 3263.x versions prior to 3263.12 3312.x versions prior to 3312.6All other unmaintained versions are potentially vulnerable.
MitigationOSS users are strongly encouraged to follow one of the mitigations below:
The Cloud Foundry project recommends upgrading to the following BOSH stemcells:
Upgrade all older versions to 3151.5 or later Upgrade 3233.x versions to 3233.6 or later Upgrade 3263.x versions to 3263.12 or later Upgrade 3312.x versions to 3312.6 or later Upgrade all other unmaintained versions to the most recent version of a maintained version line. CreditMarco Grassi, Andreas Gruenbacher, Daxing Guo, and Jan Kara
References https://www.ubuntu.com/usn/usn-3146-2/ http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7097.html http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-7425.html http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-8658.html http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-9644.html http://bosh.io