========================================================================== Kernel Live Patch Security Notice LSN-0013-1 November 30, 2016 linux vulnerability ========================================================================== A security issue affects these releases of Ubuntu: | Series | Base kernel | Arch | flavors | |------------------+--------------+----------+------------------| | Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic | | Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency | Summary: Several security issues were fixed in the kernel. Software Description: - linux: Linux kernel Details: Ondrej Kozina discovered that the keyring interface in the Linux kernel contained a buffer overflow when displaying timeout events via the /proc/keys interface. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-7042) Dmitry Vyukov discovered a use-after-free vulnerability during error processing in the recvmmsg(2) implementation in the Linux kernel. A remote attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-7117) Marco Grassi discovered that the driver for Areca RAID Controllers in the Linux kernel did not properly validate control messages. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-7425) Daxing Guo discovered a stack-based buffer overflow in the Broadcom IEEE802.11n FullMAC driver in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-8658) Update instructions: The problem can be corrected by updating your livepatches to the following versions: | Kernel | Version | flavors | |-----------------+----------+--------------------------| | 4.4.0-21.37 | 14.1 | generic, lowlatency | | 4.4.0-22.39 | 14.1 | generic, lowlatency | | 4.4.0-22.40 | 14.1 | generic, lowlatency | | 4.4.0-24.43 | 14.1 | generic, lowlatency | | 4.4.0-28.47 | 14.1 | generic, lowlatency | | 4.4.0-31.50 | 14.1 | generic, lowlatency | | 4.4.0-34.53 | 14.1 | generic, lowlatency | | 4.4.0-36.55 | 14.1 | generic, lowlatency | | 4.4.0-38.57 | 14.1 | generic, lowlatency | | 4.4.0-42.62 | 14.1 | generic, lowlatency | | 4.4.0-43.63 | 14.1 | generic, lowlatency | | 4.4.0-45.66 | 14.1 | generic, lowlatency | | 4.4.0-47.68 | 14.1 | generic, lowlatency | Additionally, you should install an updated kernel with these fixes and reboot at your convienience. References: CVE-2016-7042, CVE-2016-7117, CVE-2016-7425, CVE-2016-8658