========================================================================== Ubuntu Security Notice USN-3291-3 May 17, 2017 linux-lts-xenial vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 14.04 LTS Summary: Several security issues were fixed in the kernel. Software Description: - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty Details: USN-3291-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Dmitry Vyukov discovered that the generic SCSI (sg) subsystem in the Linux kernel contained a stack-based buffer overflow. A local attacker with access to an sg device could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7187) It was discovered that a NULL pointer dereference existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2017-7261) Li Qiang discovered that an integer overflow vulnerability existed in the Direct Rendering Manager (DRM) driver for VMWare devices in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2017-7294) It was discovered that an information leak existed in the set_mempolicy and mbind compat syscalls in the Linux kernel. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2017-7616) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 14.04 LTS: linux-image-4.4.0-78-generic 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-generic-lpae 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-lowlatency 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-powerpc-e500mc 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-powerpc-smp 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-powerpc64-emb 4.4.0-78.99~14.04.2 linux-image-4.4.0-78-powerpc64-smp 4.4.0-78.99~14.04.2 linux-image-generic-lpae-lts-xenial 4.4.0.78.63 linux-image-generic-lts-xenial 4.4.0.78.63 linux-image-lowlatency-lts-xenial 4.4.0.78.63 linux-image-powerpc-e500mc-lts-xenial 4.4.0.78.63 linux-image-powerpc-smp-lts-xenial 4.4.0.78.63 linux-image-powerpc64-emb-lts-xenial 4.4.0.78.63 linux-image-powerpc64-smp-lts-xenial 4.4.0.78.63 After a standard system update you need to reboot your computer to make all the necessary changes. ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well. References: http://www.ubuntu.com/usn/usn-3291-3 http://www.ubuntu.com/usn/usn-3291-1 CVE-2017-7187, CVE-2017-7261, CVE-2017-7294, CVE-2017-7616 Package Information: https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-78.99~14.04.2 --u/L2/WlOHZg+YGU4 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJZHJZyAAoJEC8Jno0AXoH0O3YP/jLLN7t51Hrhi9NlyW0HtZxz bN7YQ8SYxhpDm59UPDk6/MLP2vkQfkZcJzWrXvU5tsSC8NyXlqptSZ2ekMoWXBy5 miMwFTmptE+V/zg98qYWHFDDCHc3QUex+8HQCdFx+Jdu4f497MgXEZiqIrTX5HnG TFeVjtaoWM/g8QVfZkm/vKXLceBjeyCbWE3h1rgBsWGEsm9rfRkR1nvFc/4c31pJ Wvjv7BYArtRpxDyl8Q0oMsFxftLn7ZX1Gb4cVejBUtNgizsgF+yZ2RCWPd/xjrxO CUm8WeM8mZ9t/1IlwqS0xygRGHWatJkUfGVifbC6Ckdrt/AGjt1HakENLPd/YaWJ U9tVOBUjMiY1ycvNVGSSv5pHgqmBPuBlAsklkKtSYwFC+ljP6Le4IABPs5yNFlMV NAArwwoP9GYs1m1c/ha3EYpRAj3o+zoqNoRTVt53xu9tEAnzzM37JBYU3aLLuUKt HiFoXcNV7wMXwV9SPQgBFZFjH1DyYhiUjV+Eoce+3ZOs1EmiiysD+OfTq1oRmbob TQOsUluUfJ3Mx9fJ07IuHUtl+2GRWldMKDSlB+FZEFrp5eocsc1LwXZANPZzdpAP AvKC5/lJbGllCSVc6GFwyF+miNQStH3g7w0m62sZdMbyhNKnVrb3LsHMiLCFtEuE TR0su3bYYQ2TfL9QTn82 =gODj -----END PGP SIGNATURE----- --u/L2/WlOHZg+YGU4--