logo
DATABASE RESOURCES PRICING ABOUT US

USN-2910-1 Linux kernel vulnerability | Cloud Foundry

Description

USN-2910-1 Linux kernel vulnerability # High # Vendor Ubuntu # Versions Affected * Ubuntu 14.04 # Description halfdog discovered that OverlayFS, when mounting on top of a FUSE mount, incorrectly propagated file attributes, including setuid. A local unprivileged attacker could use this to gain privileges. ([CVE-2016-1576](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-1576>)) halfdog discovered that OverlayFS in the Linux kernel incorrectly propagated security sensitive extended attributes, such as POSIX ACLs. A local unprivileged attacker could use this to gain privileges. ([CVE-2016-1575](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-1575>)) It was discovered that the Linux kernel keyring subsystem contained a race between read and revoke operations. A local attacker could use this to cause a denial of service (system crash). ([CVE-2015-7550](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-7550>)) 郭永刚 discovered that the Linux kernel networking implementation did not validate protocol identifiers for certain protocol families, A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. ([CVE-2015-8543](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8543>)) Dmitry Vyukov discovered that the pptp implementation in the Linux kernel did not verify an address length when setting up a socket. A local attacker could use this to craft an application that exposed sensitive information from kernel memory. ([CVE-2015-8569](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8569>)) David Miller discovered that the Bluetooth implementation in the Linux kernel did not properly validate the socket address length for Synchronous Connection-Oriented (SCO) sockets. A local attacker could use this to expose sensitive information. ([CVE-2015-8575](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8575>)) It was discovered that the Linux kernel’s Filesystem in Userspace (FUSE) implementation did not handle initial zero length segments properly. A local attacker could use this to cause a denial of service (unkillable task). ([CVE-2015-8785](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2015-8785>)) The Cloud Foundry project released a BOSH stemcell version 3146.9 that has the patched version of the Linux kernel. # Affected Products and Versions _Severity is high unless otherwise noted. _ * All versions of Cloud Foundry BOSH stemcells prior to 3146.5 are vulnerable. # Mitigation Users of affected versions should apply the following mitigation: * The Cloud Foundry project recommends that Cloud Foundry deployments run with BOSH stemcells 3146.9. # Credit halfdog, 郭永刚, Dmitry Vyukov, David Miller # References * <http://www.ubuntu.com/usn/usn-2910-1> * <https://bosh.io/stemcells> * <https://github.com/cloudfoundry/cf-release>


Related