logo
DATABASE RESOURCES PRICING ABOUT US

USN-3208-2: Linux kernel (Xenial HWE) vulnerabilities | Cloud Foundry

Description

# # **Severity** High # **Vendor** Canonical Ubuntu # **Versions Affected** * Canonical Ubuntu 14.04 LTS # **Description** It was discovered that the generic SCSI block layer in the Linux kernel did not properly restrict write operations in certain situations. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. ([CVE-2016-10088](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-10088>)) CAI Qian discovered that the sysctl implementation in the Linux kernel did not properly perform reference counting in some situations. An unprivileged attacker could use this to cause a denial of service (system hang). ([CVE-2016-9191](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-9191>)) Jim Mattson discovered that the KVM implementation in the Linux kernel mismanages the #BP and #OF exceptions. A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash). ([CVE-2016-9588](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-9588>)) Andy Lutomirski and Willy Tarreau discovered that the KVM implementation in the Linux kernel did not properly emulate instructions on the SS segment register. A local attacker in a guest virtual machine could use this to cause a denial of service (guest OS crash) or possibly gain administrative privileges in the guest OS. ([CVE-2017-2583](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-2583>)) Dmitry Vyukov discovered that the KVM implementation in the Linux kernel improperly emulated certain instructions. A local attacker could use this to obtain sensitive information (kernel memory). ([CVE-2017-2584](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-2584>)) It was discovered that the KLSI KL5KUSB105 serial-to-USB device driver in the Linux kernel did not properly initialize memory related to logging. A local attacker could use this to expose sensitive information (kernel memory). ([CVE-2017-5549](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-5549>)) Andrey Konovalov discovered a use-after-free vulnerability in the DCCP implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain administrative privileges. ([CVE-2017-6074](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-6074>)) # **Affected Cloud Foundry Products and Versions** _Severity is high unless otherwise noted._ * Cloud Foundry BOSH stemcells are vulnerable, including: * 3151.x versions prior to 3151.11 * 3233.x versions prior to 3233.14 * 3263.x versions prior to 3263.20 * 3312.x versions prior to 3312.20 * 3363.x versions prior to 3363.9 # **Mitigation** OSS users are strongly encouraged to follow one of the mitigations below: * The Cloud Foundry team recommends upgrading to the following BOSH stemcells: * Upgrade 3151.x versions to 3151.11 * Upgrade 3233.x versions to 3233.14 * Upgrade 3263.x versions to 3263.20 * Upgrade 3312.x versions to 3312.20 * Upgrade 3363.x versions to 3363.9 # **References** * [https://www.ubuntu.com/usn/usn-3208-2/](<https://www.ubuntu.com/usn/usn-3208-2/>) * [CVE-2016-10088](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-10088>) * [CVE-2016-9191](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-9191>) * [CVE-2016-9588](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2016-9588>) * [CVE-2017-2583](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-2583>) * [CVE-2017-2584](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-2584>) * [CVE-2017-5549](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-5549>) * [CVE-2017-6074](<http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-6074>)


Related