Cloud Foundry Logo
blog single gear
Security Advisory

USN-3099-2 Linux kernel vulnerabilities

USN-3099-2 Linux kernel vulnerabilities




Canonical Ubuntu

Versions Affected

  • Canonical Ubuntu 14.04 LTS


USN-3099-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS.

Vladimír Beneš discovered an unbounded recursion in the VLAN and TEB Generic Receive Offload (GRO) processing implementations in the Linux kernel. A remote attacker could use this to cause a stack corruption, leading to a denial of service (system crash). (CVE-2016-7039)

Marco Grassi discovered a use-after-free condition could occur in the TCP retransmit queue handling code in the Linux kernel. A local attacker could use this to cause a denial of service (system crash) or possibly execute arbitrary code. (CVE-2016-6828)

Pengfei Wang discovered a race condition in the Adaptec AAC RAID controller driver in the Linux kernel when handling ioctl()s. A local attacker could use this to cause a denial of service (system crash). (CVE-2016-6480)

Affected Products and Versions

Severity is high unless otherwise noted.

  • Cloud Foundry BOSH stemcells are vulnerable, including:
    • All versions prior to 3146.24
    • 3151.x versions prior to 3151.2
    • 3232.x versions prior to 3232.22
    • 3233.x versions prior to 3233.2
    • 3262.x versions prior to 3262.21
    • Other versions prior to 3263.7


Users of affected versions should apply the following mitigation:

  • The Cloud Foundry team recommends upgrading to the following BOSH stemcells:
    • Upgrade all versions prior to 3146.x to 3146.24
    • Upgrade 3151.x versions to 3151.2
    • Upgrade 3232.x versions to 3232.22
    • Upgrade 3233.x versions to 3233.2
    • Upgrade 3262.x versions to 3262.21
    • Upgrade other versions to 3263.7


Vladimír Beneš, Marco Grassi, Pengfei Wang


Cloud Foundry Foundation Security Team Profile Image

Cloud Foundry Foundation Security Team, AUTHOR