First published: Wed Nov 30 2016(Updated: )
Andreas Gruenbacher and Jan Kara discovered that the filesystem implementation in the Linux kernel did not clear the setgid bit during a setxattr call. A local attacker could use this to possibly elevate group privileges. (CVE-2016-7097) Marco Grassi discovered that the driver for Areca RAID Controllers in the Linux kernel did not properly validate control messages. A local attacker could use this to cause a denial of service (system crash) or possibly gain privileges. (CVE-2016-7425)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/linux-image-powerpc-smp | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc-e500mc | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-lowlatency | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 | ||
All of | ||
ubuntu/linux-image-lowlatency | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-generic | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-powerpc-e500mc | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-powerpc64-emb | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 | ||
All of | ||
ubuntu/linux-image-generic-lpae | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-powerpc-smp | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 | ||
All of | ||
ubuntu/linux-image-powerpc64-emb | <4.8.0.28.37 | 4.8.0.28.37 |
=16.10 | ||
All of | ||
ubuntu/linux-image-4.8.0-28-generic-lpae | <4.8.0-28.30 | 4.8.0-28.30 |
=16.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this advisory is CVE-2016-7097.
A local attacker can exploit this vulnerability by using it to possibly elevate group privileges.
This vulnerability affects Linux kernel versions 4.8.0-28.30 and 4.8.0.28.37.
The severity of this vulnerability is not specified in the advisory.
To fix this vulnerability, update to Linux kernel version 4.8.0-28.30 or 4.8.0.28.37.