• Linux kernel vulnerabilities

    From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, December 03, 2019 00:10:07
    linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors

    Details

    Zhipeng Xie discovered that an infinite loop could be triggered in
    the CFS Linux kernel process scheduler. A local attacker could
    possibly use this to cause a denial of service. (CVE-2018-20784)

    Nicolas Waisman discovered that the WiFi driver stack in the Linux
    kernel did not properly validate SSID lengths. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-17133)

    Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for
    the Linux kernel performed DMA from a kernel stack. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-17075)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1063-kvm - 4.4.0-1063.70
    linux-image-4.4.0-1099-aws - 4.4.0-1099.110
    linux-image-4.4.0-1126-raspi2 - 4.4.0-1126.135
    linux-image-4.4.0-1130-snapdragon - 4.4.0-1130.138
    linux-image-4.4.0-170-generic - 4.4.0-170.199
    linux-image-4.4.0-170-generic-lpae - 4.4.0-170.199
    linux-image-4.4.0-170-lowlatency - 4.4.0-170.199
    linux-image-4.4.0-170-powerpc-e500mc - 4.4.0-170.199
    linux-image-4.4.0-170-powerpc-smp - 4.4.0-170.199
    linux-image-4.4.0-170-powerpc64-emb - 4.4.0-170.199
    linux-image-4.4.0-170-powerpc64-smp - 4.4.0-170.199
    linux-image-aws - 4.4.0.1099.103
    linux-image-generic - 4.4.0.170.178
    linux-image-generic-lpae - 4.4.0.170.178
    linux-image-kvm - 4.4.0.1063.63
    linux-image-lowlatency - 4.4.0.170.178
    linux-image-powerpc-e500mc - 4.4.0.170.178
    linux-image-powerpc-smp - 4.4.0.170.178
    linux-image-powerpc64-emb - 4.4.0.170.178
    linux-image-powerpc64-smp - 4.4.0.170.178
    linux-image-raspi2 - 4.4.0.1126.126
    linux-image-snapdragon - 4.4.0.1130.122
    linux-image-virtual - 4.4.0.170.178

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2018-20784
    * CVE-2019-17075
    * CVE-2019-17133

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, December 03, 2019 00:10:07
    linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM processors
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that a buffer overflow existed in the 802.11
    Wi-Fi configuration interface for the Linux kernel when handling
    beacon settings. A local attacker could use this to cause a denial
    of service (system crash) or possibly execute arbitrary code.
    (CVE-2019-16746)

    Nicolas Waisman discovered that the WiFi driver stack in the Linux
    kernel did not properly validate SSID lengths. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-17133)

    It was discovered that the ADIS16400 IIO IMU Driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19060)

    It was discovered that the Intel OPA Gen1 Infiniband Driver for
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19065)

    It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless
    controller driver for the Linux kernel did not properly deallocate
    memory in certain error conditions. A local attacker could use
    this to cause a denial of service (memory exhaustion).
    (CVE-2019-19075)

    Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for
    the Linux kernel performed DMA from a kernel stack. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-17075)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1030-oracle - 4.15.0-1030.33
    linux-image-4.15.0-1049-gke - 4.15.0-1049.52
    linux-image-4.15.0-1051-kvm - 4.15.0-1051.51
    linux-image-4.15.0-1052-raspi2 - 4.15.0-1052.56
    linux-image-4.15.0-1056-aws - 4.15.0-1056.58
    linux-image-4.15.0-1065-oem - 4.15.0-1065.75
    linux-image-4.15.0-1069-snapdragon - 4.15.0-1069.76
    linux-image-4.15.0-72-generic - 4.15.0-72.81
    linux-image-4.15.0-72-generic-lpae - 4.15.0-72.81
    linux-image-4.15.0-72-lowlatency - 4.15.0-72.81
    linux-image-aws - 4.15.0.1056.57
    linux-image-aws-lts-18.04 - 4.15.0.1056.57
    linux-image-generic - 4.15.0.72.74
    linux-image-generic-lpae - 4.15.0.72.74
    linux-image-gke - 4.15.0.1049.52
    linux-image-gke-4.15 - 4.15.0.1049.52
    linux-image-kvm - 4.15.0.1051.51
    linux-image-lowlatency - 4.15.0.72.74
    linux-image-oem - 4.15.0.1065.69
    linux-image-oracle - 4.15.0.1030.35
    linux-image-oracle-lts-18.04 - 4.15.0.1030.35
    linux-image-powerpc-e500mc - 4.15.0.72.74
    linux-image-powerpc-smp - 4.15.0.72.74
    linux-image-powerpc64-emb - 4.15.0.72.74
    linux-image-powerpc64-smp - 4.15.0.72.74
    linux-image-raspi2 - 4.15.0.1052.50
    linux-image-snapdragon - 4.15.0.1069.72
    linux-image-virtual - 4.15.0.72.74

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1030-oracle - 4.15.0-1030.33~16.04.1
    linux-image-4.15.0-1050-gcp - 4.15.0-1050.53
    linux-image-4.15.0-1056-aws - 4.15.0-1056.58~16.04.1
    linux-image-4.15.0-72-generic - 4.15.0-72.81~16.04.1
    linux-image-4.15.0-72-generic-lpae - 4.15.0-72.81~16.04.1
    linux-image-4.15.0-72-lowlatency - 4.15.0-72.81~16.04.1
    linux-image-aws-hwe - 4.15.0.1056.56
    linux-image-gcp - 4.15.0.1050.64
    linux-image-generic-hwe-16.04 - 4.15.0.72.92
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.72.92
    linux-image-gke - 4.15.0.1050.64
    linux-image-lowlatency-hwe-16.04 - 4.15.0.72.92
    linux-image-oem - 4.15.0.72.92
    linux-image-oracle - 4.15.0.1030.23
    linux-image-virtual-hwe-16.04 - 4.15.0.72.92

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-16746
    * CVE-2019-17075
    * CVE-2019-17133
    * CVE-2019-19060
    * CVE-2019-19065
    * CVE-2019-19075

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, December 03, 2019 00:10:07
    linux, linux-aws, linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-hwe, linux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.04
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oem-osp1 - Linux kernel for OEM processors
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the
    Linux kernel did not properly handle reference counting during
    memory mapping operations when used in conjunction with AUFS. A
    local attacker could use this to cause a denial of service (system
    crash) or possibly execute arbitrary code. (CVE-2019-15794)

    It was discovered that a buffer overflow existed in the 802.11
    Wi-Fi configuration interface for the Linux kernel when handling
    beacon settings. A local attacker could use this to cause a denial
    of service (system crash) or possibly execute arbitrary code.
    (CVE-2019-16746)

    It was discovered that there was a memory leak in the Advanced
    Buffer Management functionality of the Netronome NFP4000/NFP6000
    NIC Driver in the Linux kernel during certain error scenarios. A
    local attacker could use this to cause a denial of service (memory
    exhaustion). (CVE-2019-19076)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.04
    linux-image-5.0.0-1008-oracle - 5.0.0-1008.13
    linux-image-5.0.0-1022-aws - 5.0.0-1022.25
    linux-image-5.0.0-1023-kvm - 5.0.0-1023.25
    linux-image-5.0.0-1023-raspi2 - 5.0.0-1023.24
    linux-image-5.0.0-1026-gcp - 5.0.0-1026.27
    linux-image-5.0.0-37-generic - 5.0.0-37.40
    linux-image-5.0.0-37-generic-lpae - 5.0.0-37.40
    linux-image-5.0.0-37-lowlatency - 5.0.0-37.40
    linux-image-aws - 5.0.0.1022.24
    linux-image-gcp - 5.0.0.1026.51
    linux-image-generic - 5.0.0.37.39
    linux-image-generic-lpae - 5.0.0.37.39
    linux-image-gke - 5.0.0.1026.51
    linux-image-kvm - 5.0.0.1023.24
    linux-image-lowlatency - 5.0.0.37.39
    linux-image-oracle - 5.0.0.1008.34
    linux-image-raspi2 - 5.0.0.1023.21
    linux-image-virtual - 5.0.0.37.39

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1008-oracle - 5.0.0-1008.13~18.04.1
    linux-image-5.0.0-1022-aws - 5.0.0-1022.25~18.04.1
    linux-image-5.0.0-1026-gcp - 5.0.0-1026.27~18.04.1
    linux-image-5.0.0-1026-gke - 5.0.0-1026.27~18.04.2
    linux-image-5.0.0-1030-oem-osp1 - 5.0.0-1030.34
    linux-image-5.0.0-37-generic - 5.0.0-37.40~18.04.1
    linux-image-5.0.0-37-generic-lpae - 5.0.0-37.40~18.04.1
    linux-image-5.0.0-37-lowlatency - 5.0.0-37.40~18.04.1
    linux-image-aws-edge - 5.0.0.1022.36
    linux-image-gcp - 5.0.0.1026.30
    linux-image-generic-hwe-18.04 - 5.0.0.37.95
    linux-image-generic-lpae-hwe-18.04 - 5.0.0.37.95
    linux-image-gke-5.0 - 5.0.0.1026.15
    linux-image-lowlatency-hwe-18.04 - 5.0.0.37.95
    linux-image-oem-osp1 - 5.0.0.1030.34
    linux-image-oracle-edge - 5.0.0.1008.7
    linux-image-snapdragon-hwe-18.04 - 5.0.0.37.95
    linux-image-virtual-hwe-18.04 - 5.0.0.37.95

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-15794
    * CVE-2019-16746
    * CVE-2019-19076

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, December 03, 2019 00:10:07
    linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-kvm, linux-oracle vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems

    Details

    Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the
    Linux kernel did not properly handle reference counting during
    memory mapping operations when used in conjunction with AUFS. A
    local attacker could use this to cause a denial of service (system
    crash) or possibly execute arbitrary code. (CVE-2019-15794)

    Nicolas Waisman discovered that the WiFi driver stack in the Linux
    kernel did not properly validate SSID lengths. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-17133)

    It was discovered that the ARM Komeda display driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-18810)

    It was discovered that the VirtualBox guest driver implementation
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19048)

    It was discovered that the ADIS16400 IIO IMU Driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19060, CVE-2019-19061)

    It was discovered that the Intel OPA Gen1 Infiniband Driver for
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19065)

    It was discovered that the AMD Audio CoProcessor Driver for the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker with the ability to load modules
    could use this to cause a denial of service (memory exhaustion).
    (CVE-2019-19067)

    It was discovered in the Qualcomm FastRPC Driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19069)

    It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless
    controller driver for the Linux kernel did not properly deallocate
    memory in certain error conditions. A local attacker could use
    this to cause a denial of service (memory exhaustion).
    (CVE-2019-19075)

    It was discovered that the AMD Display Engine Driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attack could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19083)

    Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for
    the Linux kernel performed DMA from a kernel stack. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-17075)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1007-oracle - 5.3.0-1007.8
    linux-image-5.3.0-1008-aws - 5.3.0-1008.9
    linux-image-5.3.0-1008-kvm - 5.3.0-1008.9
    linux-image-5.3.0-1009-gcp - 5.3.0-1009.10
    linux-image-5.3.0-24-generic - 5.3.0-24.26
    linux-image-5.3.0-24-generic-lpae - 5.3.0-24.26
    linux-image-5.3.0-24-lowlatency - 5.3.0-24.26
    linux-image-5.3.0-24-snapdragon - 5.3.0-24.26
    linux-image-aws - 5.3.0.1008.10
    linux-image-gcp - 5.3.0.1009.10
    linux-image-generic - 5.3.0.24.28
    linux-image-generic-lpae - 5.3.0.24.28
    linux-image-gke - 5.3.0.1009.10
    linux-image-kvm - 5.3.0.1008.10
    linux-image-lowlatency - 5.3.0.24.28
    linux-image-oracle - 5.3.0.1007.8
    linux-image-snapdragon - 5.3.0.24.28
    linux-image-virtual - 5.3.0.24.28

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1009-gcp - 5.3.0-1009.10~18.04.1
    linux-image-gcp-edge - 5.3.0.1009.9

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-15794
    * CVE-2019-17075
    * CVE-2019-17133
    * CVE-2019-18810
    * CVE-2019-19048
    * CVE-2019-19060
    * CVE-2019-19061
    * CVE-2019-19065
    * CVE-2019-19067
    * CVE-2019-19069
    * CVE-2019-19075
    * CVE-2019-19083

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 07, 2020 00:10:02
    linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors

    Details

    It was discovered that a heap-based buffer overflow existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14895, CVE-2019-14901)

    It was discovered that a heap-based buffer overflow existed in the
    Marvell Libertas WLAN Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14896, CVE-2019-14897)

    Anthony Steinhauser discovered that the Linux kernel did not
    properly perform Spectre_RSB mitigations to all processors for
    PowerPC architecture systems in some situations. A local attacker
    could use this to expose sensitive information. (CVE-2019-18660)

    It was discovered that Geschwister Schneider USB CAN interface
    driver in the Linux kernel did not properly deallocate memory in
    certain failure conditions. A physically proximate attacker could
    use this to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19052)

    It was discovered that the driver for memoryless force-feedback
    input devices in the Linux kernel contained a use-after-free
    vulnerability. A physically proximate attacker could possibly use
    this to cause a denial of service (system crash) or execute
    arbitrary code. (CVE-2019-19524)

    It was discovered that the PEAK-System Technik USB driver in the
    Linux kernel did not properly sanitize memory before sending it to
    the device. A physically proximate attacker could use this to
    expose sensitive information (kernel memory). (CVE-2019-19534)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1064-kvm - 4.4.0-1064.71
    linux-image-4.4.0-1100-aws - 4.4.0-1100.111
    linux-image-4.4.0-1127-raspi2 - 4.4.0-1127.136
    linux-image-4.4.0-1131-snapdragon - 4.4.0-1131.139
    linux-image-4.4.0-171-generic - 4.4.0-171.200
    linux-image-4.4.0-171-generic-lpae - 4.4.0-171.200
    linux-image-4.4.0-171-lowlatency - 4.4.0-171.200
    linux-image-4.4.0-171-powerpc-e500mc - 4.4.0-171.200
    linux-image-4.4.0-171-powerpc-smp - 4.4.0-171.200
    linux-image-4.4.0-171-powerpc64-emb - 4.4.0-171.200
    linux-image-4.4.0-171-powerpc64-smp - 4.4.0-171.200
    linux-image-aws - 4.4.0.1100.104
    linux-image-generic - 4.4.0.171.179
    linux-image-generic-lpae - 4.4.0.171.179
    linux-image-kvm - 4.4.0.1064.64
    linux-image-lowlatency - 4.4.0.171.179
    linux-image-powerpc-e500mc - 4.4.0.171.179
    linux-image-powerpc-smp - 4.4.0.171.179
    linux-image-powerpc64-emb - 4.4.0.171.179
    linux-image-powerpc64-smp - 4.4.0.171.179
    linux-image-raspi2 - 4.4.0.1127.127
    linux-image-snapdragon - 4.4.0.1131.123
    linux-image-virtual - 4.4.0.171.179

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14895
    * CVE-2019-14896
    * CVE-2019-14897
    * CVE-2019-14901
    * CVE-2019-18660
    * CVE-2019-19052
    * CVE-2019-19524
    * CVE-2019-19534

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 07, 2020 00:10:02
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM processors
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that a heap-based buffer overflow existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14895, CVE-2019-14901)

    It was discovered that a heap-based buffer overflow existed in the
    Marvell Libertas WLAN Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14896, CVE-2019-14897)

    It was discovered that the Fujitsu ES network device driver for
    the Linux kernel did not properly check for errors in some
    situations, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service.
    (CVE-2019-16231)

    It was discovered that the QLogic Fibre Channel driver in the
    Linux kernel did not properly check for error, leading to a NULL
    pointer dereference. A local attacker could possibly use this to
    cause a denial of service (system crash). (CVE-2019-16233)

    Anthony Steinhauser discovered that the Linux kernel did not
    properly perform Spectre_RSB mitigations to all processors for
    PowerPC architecture systems in some situations. A local attacker
    could use this to expose sensitive information. (CVE-2019-18660)

    It was discovered that the Mellanox Technologies Innova driver in
    the Linux kernel did not properly deallocate memory in certain
    failure conditions. A local attacker could use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19045)

    It was discovered that Geschwister Schneider USB CAN interface
    driver in the Linux kernel did not properly deallocate memory in
    certain failure conditions. A physically proximate attacker could
    use this to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19052)

    It was discovered that the AMD Display Engine Driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attack could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19083)

    It was discovered that the driver for memoryless force-feedback
    input devices in the Linux kernel contained a use-after-free
    vulnerability. A physically proximate attacker could possibly use
    this to cause a denial of service (system crash) or execute
    arbitrary code. (CVE-2019-19524)

    It was discovered that the Microchip CAN BUS Analyzer driver in
    the Linux kernel contained a use-after-free vulnerability on
    device disconnect. A physically proximate attacker could use this
    to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-19529)

    It was discovered that the PEAK-System Technik USB driver in the
    Linux kernel did not properly sanitize memory before sending it to
    the device. A physically proximate attacker could use this to
    expose sensitive information (kernel memory). (CVE-2019-19534)

    Tristan Madani discovered that the ALSA timer implementation in
    the Linux kernel contained a use-after-free vulnerability. A local
    attacker could use this to cause a denial of service (system
    crash) or possibly execute arbitrary code. (CVE-2019-19807)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1031-oracle - 4.15.0-1031.34
    linux-image-4.15.0-1050-gke - 4.15.0-1050.53
    linux-image-4.15.0-1052-kvm - 4.15.0-1052.52
    linux-image-4.15.0-1053-raspi2 - 4.15.0-1053.57
    linux-image-4.15.0-1057-aws - 4.15.0-1057.59
    linux-image-4.15.0-1066-oem - 4.15.0-1066.76
    linux-image-4.15.0-1070-snapdragon - 4.15.0-1070.77
    linux-image-4.15.0-74-generic - 4.15.0-74.84
    linux-image-4.15.0-74-generic-lpae - 4.15.0-74.84
    linux-image-4.15.0-74-lowlatency - 4.15.0-74.84
    linux-image-aws - 4.15.0.1057.58
    linux-image-aws-lts-18.04 - 4.15.0.1057.58
    linux-image-generic - 4.15.0.74.76
    linux-image-generic-lpae - 4.15.0.74.76
    linux-image-gke - 4.15.0.1050.53
    linux-image-gke-4.15 - 4.15.0.1050.53
    linux-image-kvm - 4.15.0.1052.52
    linux-image-lowlatency - 4.15.0.74.76
    linux-image-oem - 4.15.0.1066.70
    linux-image-oracle - 4.15.0.1031.36
    linux-image-oracle-lts-18.04 - 4.15.0.1031.36
    linux-image-powerpc-e500mc - 4.15.0.74.76
    linux-image-powerpc-smp - 4.15.0.74.76
    linux-image-powerpc64-emb - 4.15.0.74.76
    linux-image-powerpc64-smp - 4.15.0.74.76
    linux-image-raspi2 - 4.15.0.1053.51
    linux-image-snapdragon - 4.15.0.1070.73
    linux-image-virtual - 4.15.0.74.76

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1031-oracle - 4.15.0-1031.34~16.04.1
    linux-image-4.15.0-1052-gcp - 4.15.0-1052.56
    linux-image-4.15.0-1057-aws - 4.15.0-1057.59~16.04.1
    linux-image-4.15.0-1066-azure - 4.15.0-1066.71
    linux-image-4.15.0-74-generic - 4.15.0-74.83~16.04.1
    linux-image-4.15.0-74-generic-lpae - 4.15.0-74.83~16.04.1
    linux-image-4.15.0-74-lowlatency - 4.15.0-74.83~16.04.1
    linux-image-aws-hwe - 4.15.0.1057.57
    linux-image-azure - 4.15.0.1066.69
    linux-image-azure-edge - 4.15.0.1066.69
    linux-image-gcp - 4.15.0.1052.66
    linux-image-generic-hwe-16.04 - 4.15.0.74.94
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.74.94
    linux-image-gke - 4.15.0.1052.66
    linux-image-lowlatency-hwe-16.04 - 4.15.0.74.94
    linux-image-oem - 4.15.0.74.94
    linux-image-oracle - 4.15.0.1031.24
    linux-image-virtual-hwe-16.04 - 4.15.0.74.94

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14895
    * CVE-2019-14896
    * CVE-2019-14897
    * CVE-2019-14901
    * CVE-2019-16231
    * CVE-2019-16233
    * CVE-2019-18660
    * CVE-2019-19045
    * CVE-2019-19052
    * CVE-2019-19083
    * CVE-2019-19524
    * CVE-2019-19529
    * CVE-2019-19534
    * CVE-2019-19807

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 07, 2020 00:10:02
    linux, linux-aws, linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-kvm, linux-oem-osp1, linux-oracle, linux-oracle-5.0, linux-raspi2 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.04
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM processors
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    Michael Hanselmann discovered that the CIFS implementation in the
    Linux kernel did not sanitize paths returned by an SMB server. An
    attacker controlling an SMB server could use this to overwrite
    arbitrary files. (CVE-2019-10220)

    It was discovered that a heap-based buffer overflow existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14895, CVE-2019-14901)

    It was discovered that a heap-based buffer overflow existed in the
    Marvell Libertas WLAN Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14896, CVE-2019-14897)

    It was discovered that the Fujitsu ES network device driver for
    the Linux kernel did not properly check for errors in some
    situations, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service.
    (CVE-2019-16231)

    It was discovered that the QLogic Fibre Channel driver in the
    Linux kernel did not properly check for error, leading to a NULL
    pointer dereference. A local attacker could possibly use this to
    cause a denial of service (system crash). (CVE-2019-16233)

    Nicolas Waisman discovered that the WiFi driver stack in the Linux
    kernel did not properly validate SSID lengths. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-17133)

    Anthony Steinhauser discovered that the Linux kernel did not
    properly perform Spectre_RSB mitigations to all processors for
    PowerPC architecture systems in some situations. A local attacker
    could use this to expose sensitive information. (CVE-2019-18660)

    It was discovered that the Mellanox Technologies Innova driver in
    the Linux kernel did not properly deallocate memory in certain
    failure conditions. A local attacker could use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19045)

    It was discovered that the VirtualBox guest driver implementation
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19048)

    It was discovered that Geschwister Schneider USB CAN interface
    driver in the Linux kernel did not properly deallocate memory in
    certain failure conditions. A physically proximate attacker could
    use this to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19052)

    It was discovered that the netlink-based 802.11 configuration
    interface in the Linux kernel did not deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19055)

    It was discovered that the ADIS16400 IIO IMU Driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19060)

    It was discovered that the Intel OPA Gen1 Infiniband Driver for
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19065)

    It was discovered that the AMD Audio CoProcessor Driver for the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker with the ability to load modules
    could use this to cause a denial of service (memory exhaustion).
    (CVE-2019-19067)

    It was discovered that the event tracing subsystem of the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19072)

    It was discovered that the Cascoda CA8210 SPI 802.15.4 wireless
    controller driver for the Linux kernel did not properly deallocate
    memory in certain error conditions. A local attacker could use
    this to cause a denial of service (memory exhaustion).
    (CVE-2019-19075)

    It was discovered that the AMD Display Engine Driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attack could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19083)

    It was discovered that the driver for memoryless force-feedback
    input devices in the Linux kernel contained a use-after-free
    vulnerability. A physically proximate attacker could possibly use
    this to cause a denial of service (system crash) or execute
    arbitrary code. (CVE-2019-19524)

    It was discovered that the NXP PN533 NFC USB driver in the Linux
    kernel did not properly free resources after a late probe error,
    leading to a use- after-free vulnerability. A physically proximate
    attacker could use this to cause a denial of service (system
    crash) or possibly execute arbitrary code. (CVE-2019-19526)

    It was discovered that the Microchip CAN BUS Analyzer driver in
    the Linux kernel contained a use-after-free vulnerability on
    device disconnect. A physically proximate attacker could use this
    to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-19529)

    It was discovered that multiple USB HID device drivers in the
    Linux kernel did not properly validate device metadata on
    attachment, leading to out-of- bounds writes. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-19532)

    It was discovered that the PEAK-System Technik USB driver in the
    Linux kernel did not properly sanitize memory before sending it to
    the device. A physically proximate attacker could use this to
    expose sensitive information (kernel memory). (CVE-2019-19534)

    It was discovered that in some situations the fair scheduler in
    the Linux kernel did not permit a process to use its full quota
    time slice. A local attacker could use this to cause a denial of
    service. (CVE-2019-19922)

    It was discovered that the binder IPC implementation in the Linux
    kernel did not properly perform bounds checking in some
    situations, leading to an out-of-bounds write. A local attacker
    could use this to cause a denial of service (system crash) or
    possibly execute arbitrary code. (CVE-2019-2214)

    Nicolas Waisman discovered that the Chelsio T4/T5 RDMA Driver for
    the Linux kernel performed DMA from a kernel stack. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-17075)

    It was discovered that the DesignWare USB3 controller driver in
    the Linux kernel did not properly deallocate memory in some error
    conditions. A local attacker could possibly use this to cause a
    denial of service (memory exhaustion). (CVE-2019-18813)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.04
    linux-image-5.0.0-1009-oracle - 5.0.0-1009.14
    linux-image-5.0.0-1023-aws - 5.0.0-1023.26
    linux-image-5.0.0-1024-kvm - 5.0.0-1024.26
    linux-image-5.0.0-1024-raspi2 - 5.0.0-1024.25
    linux-image-5.0.0-1028-azure - 5.0.0-1028.30
    linux-image-5.0.0-1028-gcp - 5.0.0-1028.29
    linux-image-5.0.0-38-generic - 5.0.0-38.41
    linux-image-5.0.0-38-generic-lpae - 5.0.0-38.41
    linux-image-5.0.0-38-lowlatency - 5.0.0-38.41
    linux-image-aws - 5.0.0.1023.25
    linux-image-azure - 5.0.0.1028.28
    linux-image-gcp - 5.0.0.1028.53
    linux-image-generic - 5.0.0.38.40
    linux-image-generic-lpae - 5.0.0.38.40
    linux-image-gke - 5.0.0.1028.53
    linux-image-kvm - 5.0.0.1024.25
    linux-image-lowlatency - 5.0.0.38.40
    linux-image-oracle - 5.0.0.1009.35
    linux-image-raspi2 - 5.0.0.1024.22
    linux-image-virtual - 5.0.0.38.40

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1009-oracle - 5.0.0-1009.14~18.04.1
    linux-image-5.0.0-1023-aws - 5.0.0-1023.26~18.04.1
    linux-image-5.0.0-1027-gke - 5.0.0-1027.28~18.04.1
    linux-image-5.0.0-1028-azure - 5.0.0-1028.30~18.04.1
    linux-image-5.0.0-1033-oem-osp1 - 5.0.0-1033.38
    linux-image-aws-edge - 5.0.0.1023.37
    linux-image-azure - 5.0.0.1028.39
    linux-image-gke-5.0 - 5.0.0.1027.16
    linux-image-oem-osp1 - 5.0.0.1033.37
    linux-image-oracle-edge - 5.0.0.1009.8

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-10220
    * CVE-2019-14895
    * CVE-2019-14896
    * CVE-2019-14897
    * CVE-2019-14901
    * CVE-2019-16231
    * CVE-2019-16233
    * CVE-2019-17075
    * CVE-2019-17133
    * CVE-2019-18660
    * CVE-2019-18813
    * CVE-2019-19045
    * CVE-2019-19048
    * CVE-2019-19052
    * CVE-2019-19055
    * CVE-2019-19060
    * CVE-2019-19065
    * CVE-2019-19067
    * CVE-2019-19072
    * CVE-2019-19075
    * CVE-2019-19083
    * CVE-2019-19524
    * CVE-2019-19526
    * CVE-2019-19529
    * CVE-2019-19532
    * CVE-2019-19534
    * CVE-2019-19922
    * CVE-2019-2214

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 07, 2020 00:10:02
    linux, linux-aws, linux-azure, linux-azure-5.3, linux-gcp,
    linux-gcp-5.3, linux-kvm, linux-oracle, linux-raspi2 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-azure-5.3 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems

    Details

    It was discovered that a heap-based buffer overflow existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14895, CVE-2019-14901)

    It was discovered that a heap-based buffer overflow existed in the
    Marvell Libertas WLAN Driver for the Linux kernel. A physically
    proximate attacker could use this to cause a denial of service
    (system crash) or possibly execute arbitrary code.
    (CVE-2019-14896, CVE-2019-14897)

    It was discovered that the Fujitsu ES network device driver for
    the Linux kernel did not properly check for errors in some
    situations, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service.
    (CVE-2019-16231)

    Anthony Steinhauser discovered that the Linux kernel did not
    properly perform Spectre_RSB mitigations to all processors for
    PowerPC architecture systems in some situations. A local attacker
    could use this to expose sensitive information. (CVE-2019-18660)

    It was discovered that the Broadcom V3D DRI driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19044)

    It was discovered that the Mellanox Technologies Innova driver in
    the Linux kernel did not properly deallocate memory in certain
    failure conditions. A local attacker could use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19045)

    It was discovered that the Mellanox Technologies ConnectX driver
    in the Linux kernel did not properly deallocate memory in certain
    failure conditions. A local attacker could use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19047)

    It was discovered that the Intel WiMAX 2400 driver in the Linux
    kernel did not properly deallocate memory in certain situations. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19051)

    It was discovered that Geschwister Schneider USB CAN interface
    driver in the Linux kernel did not properly deallocate memory in
    certain failure conditions. A physically proximate attacker could
    use this to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19052)

    It was discovered that the netlink-based 802.11 configuration
    interface in the Linux kernel did not deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19055)

    It was discovered that the event tracing subsystem of the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19072)

    It was discovered that the driver for memoryless force-feedback
    input devices in the Linux kernel contained a use-after-free
    vulnerability. A physically proximate attacker could possibly use
    this to cause a denial of service (system crash) or execute
    arbitrary code. (CVE-2019-19524)

    It was discovered that the Microchip CAN BUS Analyzer driver in
    the Linux kernel contained a use-after-free vulnerability on
    device disconnect. A physically proximate attacker could use this
    to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-19529)

    It was discovered that the PEAK-System Technik USB driver in the
    Linux kernel did not properly sanitize memory before sending it to
    the device. A physically proximate attacker could use this to
    expose sensitive information (kernel memory). (CVE-2019-19534)

    Tristan Madani discovered that the ALSA timer implementation in
    the Linux kernel contained a use-after-free vulnerability. A local
    attacker could use this to cause a denial of service (system
    crash) or possibly execute arbitrary code. (CVE-2019-19807)

    It was discovered that the DesignWare USB3 controller driver in
    the Linux kernel did not properly deallocate memory in some error
    conditions. A local attacker could possibly use this to cause a
    denial of service (memory exhaustion). (CVE-2019-18813)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1008-oracle - 5.3.0-1008.9
    linux-image-5.3.0-1009-aws - 5.3.0-1009.10
    linux-image-5.3.0-1009-azure - 5.3.0-1009.10
    linux-image-5.3.0-1009-kvm - 5.3.0-1009.10
    linux-image-5.3.0-1011-gcp - 5.3.0-1011.12
    linux-image-5.3.0-1015-raspi2 - 5.3.0-1015.17
    linux-image-5.3.0-26-generic - 5.3.0-26.28
    linux-image-5.3.0-26-generic-lpae - 5.3.0-26.28
    linux-image-5.3.0-26-lowlatency - 5.3.0-26.28
    linux-image-5.3.0-26-snapdragon - 5.3.0-26.28
    linux-image-aws - 5.3.0.1009.11
    linux-image-azure - 5.3.0.1009.27
    linux-image-gcp - 5.3.0.1011.12
    linux-image-generic - 5.3.0.26.30
    linux-image-generic-lpae - 5.3.0.26.30
    linux-image-gke - 5.3.0.1011.12
    linux-image-kvm - 5.3.0.1009.11
    linux-image-lowlatency - 5.3.0.26.30
    linux-image-oracle - 5.3.0.1008.9
    linux-image-raspi2 - 5.3.0.1015.12
    linux-image-snapdragon - 5.3.0.26.30
    linux-image-virtual - 5.3.0.26.30

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1009-azure - 5.3.0-1009.10~18.04.1
    linux-image-5.3.0-1010-gcp - 5.3.0-1010.11~18.04.1
    linux-image-azure-edge - 5.3.0.1009.9
    linux-image-gcp-edge - 5.3.0.1010.10

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14895
    * CVE-2019-14896
    * CVE-2019-14897
    * CVE-2019-14901
    * CVE-2019-16231
    * CVE-2019-18660
    * CVE-2019-18813
    * CVE-2019-19044
    * CVE-2019-19045
    * CVE-2019-19047
    * CVE-2019-19051
    * CVE-2019-19052
    * CVE-2019-19055
    * CVE-2019-19072
    * CVE-2019-19524
    * CVE-2019-19529
    * CVE-2019-19534
    * CVE-2019-19807

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 28, 2020 00:10:01
    linux, linux-aws, linux-oem vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-oem - Linux kernel for OEM processors

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that a race condition can lead to a
    use-after-free while destroying GEM contexts in the i915 driver
    for the Linux kernel. A local attacker could use this to cause a
    denial of service (system crash) or possibly execute arbitrary
    code. (CVE-2020-7053)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1058-aws - 4.15.0-1058.60
    linux-image-4.15.0-1067-oem - 4.15.0-1067.77
    linux-image-4.15.0-76-generic - 4.15.0-76.86
    linux-image-4.15.0-76-generic-lpae - 4.15.0-76.86
    linux-image-4.15.0-76-lowlatency - 4.15.0-76.86
    linux-image-aws - 4.15.0.1058.59
    linux-image-aws-lts-18.04 - 4.15.0.1058.59
    linux-image-generic - 4.15.0.76.78
    linux-image-generic-lpae - 4.15.0.76.78
    linux-image-lowlatency - 4.15.0.76.78
    linux-image-oem - 4.15.0.1067.71
    linux-image-powerpc-e500mc - 4.15.0.76.78
    linux-image-powerpc-smp - 4.15.0.76.78
    linux-image-powerpc64-emb - 4.15.0.76.78
    linux-image-powerpc64-smp - 4.15.0.76.78
    linux-image-virtual - 4.15.0.76.78

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2020-7053

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, January 28, 2020 00:10:01
    linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that a race condition existed in the Virtual
    Video Test Driver in the Linux kernel. An attacker with write
    access to /dev/video0 on a system with the vivid module loaded
    could possibly use this to gain administrative privileges.
    (CVE-2019-18683)

    It was discovered that the btrfs file system in the Linux kernel
    did not properly validate metadata, leading to a NULL pointer
    dereference. An attacker could use this to specially craft a file
    system image that, when mounted, could cause a denial of service
    (system crash). (CVE-2019-18885)

    It was discovered that multiple memory leaks existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19057)

    It was discovered that the crypto subsystem in the Linux kernel
    did not properly deallocate memory in certain error conditions. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19062)

    It was discovered that the Realtek rtlwifi USB device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19063)

    Dan Carpenter discovered that the AppleTalk networking subsystem
    of the Linux kernel did not properly handle certain error
    conditions, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-19227)

    It was discovered that the KVM hypervisor implementation in the
    Linux kernel did not properly handle ioctl requests to get
    emulated CPUID features. An attacker with access to /dev/kvm could
    use this to cause a denial of service (system crash).
    (CVE-2019-19332)

    It was discovered that the B2C2 FlexCop USB device driver in the
    Linux kernel did not properly validate device metadata. A
    physically proximate attacker could use this to cause a denial of
    service (system crash). (CVE-2019-15291)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1065-kvm - 4.4.0-1065.72
    linux-image-4.4.0-1101-aws - 4.4.0-1101.112
    linux-image-4.4.0-1128-raspi2 - 4.4.0-1128.137
    linux-image-4.4.0-1132-snapdragon - 4.4.0-1132.140
    linux-image-4.4.0-173-generic - 4.4.0-173.203
    linux-image-4.4.0-173-generic-lpae - 4.4.0-173.203
    linux-image-4.4.0-173-lowlatency - 4.4.0-173.203
    linux-image-4.4.0-173-powerpc-e500mc - 4.4.0-173.203
    linux-image-4.4.0-173-powerpc-smp - 4.4.0-173.203
    linux-image-4.4.0-173-powerpc64-emb - 4.4.0-173.203
    linux-image-4.4.0-173-powerpc64-smp - 4.4.0-173.203
    linux-image-aws - 4.4.0.1101.105
    linux-image-generic - 4.4.0.173.181
    linux-image-generic-lpae - 4.4.0.173.181
    linux-image-kvm - 4.4.0.1065.65
    linux-image-lowlatency - 4.4.0.173.181
    linux-image-powerpc-e500mc - 4.4.0.173.181
    linux-image-powerpc-smp - 4.4.0.173.181
    linux-image-powerpc64-emb - 4.4.0.173.181
    linux-image-powerpc64-smp - 4.4.0.173.181
    linux-image-raspi2 - 4.4.0.1128.128
    linux-image-snapdragon - 4.4.0.1132.124
    linux-image-virtual - 4.4.0.173.181

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2019-15291
    * CVE-2019-18683
    * CVE-2019-18885
    * CVE-2019-19057
    * CVE-2019-19062
    * CVE-2019-19063
    * CVE-2019-19227
    * CVE-2019-19332

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, January 29, 2020 00:10:04
    linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-oracle-5.0
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly validate device
    metadata. A physically proximate attacker could use this to cause
    a denial of service (system crash). (CVE-2019-15099)

    It was discovered that a race condition existed in the Virtual
    Video Test Driver in the Linux kernel. An attacker with write
    access to /dev/video0 on a system with the vivid module loaded
    could possibly use this to gain administrative privileges.
    (CVE-2019-18683)

    It was discovered that the btrfs file system in the Linux kernel
    did not properly validate metadata, leading to a NULL pointer
    dereference. An attacker could use this to specially craft a file
    system image that, when mounted, could cause a denial of service
    (system crash). (CVE-2019-18885)

    It was discovered that the crypto subsystem in the Linux kernel
    did not properly deallocate memory in certain error conditions. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19050, CVE-2019-19062)

    It was discovered that the RSI 91x WLAN device driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19071)

    It was discovered that the Broadcom Netxtreme HCA device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19077)

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly deallocate memory in
    certain error conditions. A local attacker could possibly use this
    to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19078)

    It was discovered that the Qualcomm IPC Router TUN device driver
    in the Linux kernel did not properly deallocate memory in certain
    situations. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19079)

    It was discovered that the AMD GPU device drivers in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19082)

    Dan Carpenter discovered that the AppleTalk networking subsystem
    of the Linux kernel did not properly handle certain error
    conditions, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-19227)

    Or Cohen discovered that the virtual console subsystem in the
    Linux kernel did not properly restrict writes to unimplemented
    vcsu (unicode) devices. A local attacker could possibly use this
    to cause a denial of service (system crash) or have other
    unspecified impacts. (CVE-2019-19252)

    It was discovered that the KVM hypervisor implementation in the
    Linux kernel did not properly handle ioctl requests to get
    emulated CPUID features. An attacker with access to /dev/kvm could
    use this to cause a denial of service (system crash).
    (CVE-2019-19332)

    It was discovered that the ext4 file system implementation in the
    Linux kernel did not properly handle certain conditions. An
    attacker could use this to specially craft an ext4 file system
    that, when mounted, could cause a denial of service (system crash)
    or possibly execute arbitrary code. (CVE-2019-19767)

    It was discovered that the B2C2 FlexCop USB device driver in the
    Linux kernel did not properly validate device metadata. A
    physically proximate attacker could use this to cause a denial of
    service (system crash). (CVE-2019-15291)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1010-oracle - 5.0.0-1010.15~18.04.1
    linux-image-5.0.0-1024-aws - 5.0.0-1024.27~18.04.1
    linux-image-5.0.0-1029-gcp - 5.0.0-1029.30~18.04.1
    linux-image-5.0.0-1029-gke - 5.0.0-1029.30~18.04.1
    linux-image-aws-edge - 5.0.0.1024.38
    linux-image-gcp - 5.0.0.1029.33
    linux-image-gke-5.0 - 5.0.0.1029.17
    linux-image-oracle-edge - 5.0.0.1010.9

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-15099
    * CVE-2019-15291
    * CVE-2019-18683
    * CVE-2019-18885
    * CVE-2019-19050
    * CVE-2019-19062
    * CVE-2019-19071
    * CVE-2019-19077
    * CVE-2019-19078
    * CVE-2019-19079
    * CVE-2019-19082
    * CVE-2019-19227
    * CVE-2019-19252
    * CVE-2019-19332
    * CVE-2019-19767

    --- Mystic BBS v1.12 A43 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, February 18, 2020 20:10:04
    linux, linux-aws, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-azure-5.3 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi 2

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly validate device
    metadata. A physically proximate attacker could use this to cause
    a denial of service (system crash). (CVE-2019-15099)

    It was discovered that the HSA Linux kernel driver for AMD GPU
    devices did not properly check for errors in certain situations,
    leading to a NULL pointer dereference. A local attacker could
    possibly use this to cause a denial of service. (CVE-2019-16229)

    It was discovered that the Marvell 8xxx Libertas WLAN device
    driver in the Linux kernel did not properly check for errors in
    certain situations, leading to a NULL pointer dereference. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2019-16232)

    It was discovered that a race condition existed in the Virtual
    Video Test Driver in the Linux kernel. An attacker with write
    access to /dev/video0 on a system with the vivid module loaded
    could possibly use this to gain administrative privileges.
    (CVE-2019-18683)

    It was discovered that the Renesas Digital Radio Interface (DRIF)
    driver in the Linux kernel did not properly initialize data. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-18786)

    It was discovered that the Sound Open Firmware (SOF) driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-18811)

    It was discovered that the crypto subsystem in the Linux kernel
    did not properly deallocate memory in certain error conditions. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19050, CVE-2019-19062)

    It was discovered that multiple memory leaks existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19057)

    It was discovered that the Realtek rtlwifi USB device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19063)

    It was discovered that the RSI 91x WLAN device driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19071)

    It was discovered that the Broadcom Netxtreme HCA device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19077)

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly deallocate memory in
    certain error conditions. A local attacker could possibly use this
    to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19078)

    It was discovered that the AMD GPU device drivers in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19082)

    It was discovered that the IO uring implementation in the Linux
    kernel did not properly perform credentials checks in certain
    situations. A local attacker could possibly use this to gain
    administrative privileges. (CVE-2019-19241)

    Or Cohen discovered that the virtual console subsystem in the
    Linux kernel did not properly restrict writes to unimplemented
    vcsu (unicode) devices. A local attacker could possibly use this
    to cause a denial of service (system crash) or have other
    unspecified impacts. (CVE-2019-19252)

    It was discovered that the KVM hypervisor implementation in the
    Linux kernel did not properly handle ioctl requests to get
    emulated CPUID features. An attacker with access to /dev/kvm could
    use this to cause a denial of service (system crash).
    (CVE-2019-19332)

    It was discovered that a race condition existed in the Linux
    kernel on x86 platforms when keeping track of which process was
    assigned control of the FPU. A local attacker could use this to
    cause a denial of service (memory corruption) or possibly gain
    administrative privileges. (CVE-2019-19602)

    It was discovered that the ext4 file system implementation in the
    Linux kernel did not properly handle certain conditions. An
    attacker could use this to specially craft an ext4 file system
    that, when mounted, could cause a denial of service (system crash)
    or possibly execute arbitrary code. (CVE-2019-19767)

    It was discovered that the Kvaser CAN/USB driver in the Linux
    kernel did not properly initialize memory in certain situations. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-19947)

    Gao Chuan discovered that the SAS Class driver in the Linux kernel
    contained a race condition that could lead to a NULL pointer
    dereference. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19965)

    It was discovered that the B2C2 FlexCop USB device driver in the
    Linux kernel did not properly validate device metadata. A
    physically proximate attacker could use this to cause a denial of
    service (system crash). (CVE-2019-15291)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1009-oracle - 5.3.0-1009.10
    linux-image-5.3.0-1010-kvm - 5.3.0-1010.11
    linux-image-5.3.0-1011-aws - 5.3.0-1011.12
    linux-image-5.3.0-1012-gcp - 5.3.0-1012.13
    linux-image-5.3.0-1018-raspi2 - 5.3.0-1018.20
    linux-image-5.3.0-40-generic - 5.3.0-40.32
    linux-image-5.3.0-40-generic-lpae - 5.3.0-40.32
    linux-image-5.3.0-40-lowlatency - 5.3.0-40.32
    linux-image-5.3.0-40-snapdragon - 5.3.0-40.32
    linux-image-aws - 5.3.0.1011.13
    linux-image-gcp - 5.3.0.1012.13
    linux-image-generic - 5.3.0.40.34
    linux-image-generic-lpae - 5.3.0.40.34
    linux-image-gke - 5.3.0.1012.13
    linux-image-kvm - 5.3.0.1010.12
    linux-image-lowlatency - 5.3.0.40.34
    linux-image-oracle - 5.3.0.1009.10
    linux-image-raspi2 - 5.3.0.1018.15
    linux-image-snapdragon - 5.3.0.40.34
    linux-image-virtual - 5.3.0.40.34

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1012-gcp - 5.3.0-1012.13~18.04.1
    linux-image-5.3.0-1013-azure - 5.3.0-1013.14~18.04.1
    linux-image-5.3.0-1018-raspi2 - 5.3.0-1018.20~18.04.1
    linux-image-5.3.0-40-generic - 5.3.0-40.32~18.04.1
    linux-image-5.3.0-40-generic-lpae - 5.3.0-40.32~18.04.1
    linux-image-5.3.0-40-lowlatency - 5.3.0-40.32~18.04.1
    linux-image-azure-edge - 5.3.0.1013.13
    linux-image-gcp-edge - 5.3.0.1012.11
    linux-image-generic-hwe-18.04 - 5.3.0.40.97
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.40.97
    linux-image-lowlatency-hwe-18.04 - 5.3.0.40.97
    linux-image-raspi2-hwe-18.04 - 5.3.0.1018.7
    linux-image-snapdragon-hwe-18.04 - 5.3.0.40.97
    linux-image-virtual-hwe-18.04 - 5.3.0.40.97

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2019-15099
    * CVE-2019-15291
    * CVE-2019-16229
    * CVE-2019-16232
    * CVE-2019-18683
    * CVE-2019-18786
    * CVE-2019-18811
    * CVE-2019-19050
    * CVE-2019-19057
    * CVE-2019-19062
    * CVE-2019-19063
    * CVE-2019-19071
    * CVE-2019-19077
    * CVE-2019-19078
    * CVE-2019-19082
    * CVE-2019-19241
    * CVE-2019-19252
    * CVE-2019-19332
    * CVE-2019-19602
    * CVE-2019-19767
    * CVE-2019-19947
    * CVE-2019-19965

    --- Mystic BBS v1.12 A44 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, February 18, 2020 20:10:04
    linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that a race condition existed in the Softmac USB
    Prism54 device driver in the Linux kernel. A physically proximate
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-15220)

    Julien Grall discovered that the Xen balloon memory driver in the
    Linux kernel did not properly restrict the amount of memory set
    aside for page mappings in some situations. An attacker could use
    this to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-17351)

    It was discovered that the Intel WiMAX 2400 driver in the Linux
    kernel did not properly deallocate memory in certain situations. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19051)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    Gao Chuan discovered that the SAS Class driver in the Linux kernel
    contained a race condition that could lead to a NULL pointer
    dereference. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19965)

    It was discovered that the Datagram Congestion Control Protocol
    (DCCP) implementation in the Linux kernel did not properly
    deallocate memory in certain error conditions. An attacker could
    possibly use this to cause a denial of service (kernel memory
    exhaustion). (CVE-2019-20096)

    Mitchell Frank discovered that the Wi-Fi implementation in the
    Linux kernel when used as an access point would send IAPP location
    updates for stations before client authentication had completed. A
    physically proximate attacker could use this to cause a denial of
    service. (CVE-2019-5108)

    It was discovered that ZR364XX Camera USB device driver for the
    Linux kernel did not properly initialize memory. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-15217)

    It was discovered that the Line 6 POD USB device driver in the
    Linux kernel did not properly validate data size information from
    the device. A physically proximate attacker could use this to
    cause a denial of service (system crash). (CVE-2019-15221)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1066-kvm - 4.4.0-1066.73
    linux-image-4.4.0-1102-aws - 4.4.0-1102.113
    linux-image-4.4.0-1129-raspi2 - 4.4.0-1129.138
    linux-image-4.4.0-1133-snapdragon - 4.4.0-1133.141
    linux-image-4.4.0-174-generic - 4.4.0-174.204
    linux-image-4.4.0-174-generic-lpae - 4.4.0-174.204
    linux-image-4.4.0-174-lowlatency - 4.4.0-174.204
    linux-image-4.4.0-174-powerpc-e500mc - 4.4.0-174.204
    linux-image-4.4.0-174-powerpc-smp - 4.4.0-174.204
    linux-image-4.4.0-174-powerpc64-emb - 4.4.0-174.204
    linux-image-4.4.0-174-powerpc64-smp - 4.4.0-174.204
    linux-image-aws - 4.4.0.1102.106
    linux-image-generic - 4.4.0.174.182
    linux-image-generic-lpae - 4.4.0.174.182
    linux-image-kvm - 4.4.0.1066.66
    linux-image-lowlatency - 4.4.0.174.182
    linux-image-powerpc-e500mc - 4.4.0.174.182
    linux-image-powerpc-smp - 4.4.0.174.182
    linux-image-powerpc64-emb - 4.4.0.174.182
    linux-image-powerpc64-smp - 4.4.0.174.182
    linux-image-raspi2 - 4.4.0.1129.129
    linux-image-snapdragon - 4.4.0.1133.125
    linux-image-virtual - 4.4.0.174.182

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2019-15217
    * CVE-2019-15220
    * CVE-2019-15221
    * CVE-2019-17351
    * CVE-2019-19051
    * CVE-2019-19056
    * CVE-2019-19066
    * CVE-2019-19068
    * CVE-2019-19965
    * CVE-2019-20096
    * CVE-2019-5108

    --- Mystic BBS v1.12 A44 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, February 18, 2020 20:10:04
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly validate device
    metadata. A physically proximate attacker could use this to cause
    a denial of service (system crash). (CVE-2019-15099)

    It was discovered that the HSA Linux kernel driver for AMD GPU
    devices did not properly check for errors in certain situations,
    leading to a NULL pointer dereference. A local attacker could
    possibly use this to cause a denial of service. (CVE-2019-16229)

    It was discovered that the Marvell 8xxx Libertas WLAN device
    driver in the Linux kernel did not properly check for errors in
    certain situations, leading to a NULL pointer dereference. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2019-16232)

    It was discovered that a race condition existed in the Virtual
    Video Test Driver in the Linux kernel. An attacker with write
    access to /dev/video0 on a system with the vivid module loaded
    could possibly use this to gain administrative privileges.
    (CVE-2019-18683)

    It was discovered that the Renesas Digital Radio Interface (DRIF)
    driver in the Linux kernel did not properly initialize data. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-18786)

    It was discovered that the Afatech AF9005 DVB-T USB device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-18809)

    It was discovered that the btrfs file system in the Linux kernel
    did not properly validate metadata, leading to a NULL pointer
    dereference. An attacker could use this to specially craft a file
    system image that, when mounted, could cause a denial of service
    (system crash). (CVE-2019-18885)

    It was discovered that multiple memory leaks existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19057)

    It was discovered that the crypto subsystem in the Linux kernel
    did not properly deallocate memory in certain error conditions. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19062)

    It was discovered that the Realtek rtlwifi USB device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19063)

    It was discovered that the RSI 91x WLAN device driver in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19071)

    It was discovered that the Atheros 802.11ac wireless USB device
    driver in the Linux kernel did not properly deallocate memory in
    certain error conditions. A local attacker could possibly use this
    to cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19078)

    It was discovered that the AMD GPU device drivers in the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19082)

    Dan Carpenter discovered that the AppleTalk networking subsystem
    of the Linux kernel did not properly handle certain error
    conditions, leading to a NULL pointer dereference. A local
    attacker could use this to cause a denial of service (system
    crash). (CVE-2019-19227)

    It was discovered that the KVM hypervisor implementation in the
    Linux kernel did not properly handle ioctl requests to get
    emulated CPUID features. An attacker with access to /dev/kvm could
    use this to cause a denial of service (system crash).
    (CVE-2019-19332)

    It was discovered that the ext4 file system implementation in the
    Linux kernel did not properly handle certain conditions. An
    attacker could use this to specially craft an ext4 file system
    that, when mounted, could cause a denial of service (system crash)
    or possibly execute arbitrary code. (CVE-2019-19767)

    Gao Chuan discovered that the SAS Class driver in the Linux kernel
    contained a race condition that could lead to a NULL pointer
    dereference. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19965)

    It was discovered that the Datagram Congestion Control Protocol
    (DCCP) implementation in the Linux kernel did not properly
    deallocate memory in certain error conditions. An attacker could
    possibly use this to cause a denial of service (kernel memory
    exhaustion). (CVE-2019-20096)

    Mitchell Frank discovered that the Wi-Fi implementation in the
    Linux kernel when used as an access point would send IAPP location
    updates for stations before client authentication had completed. A
    physically proximate attacker could use this to cause a denial of
    service. (CVE-2019-5108)

    It was discovered that a race condition can lead to a
    use-after-free while destroying GEM contexts in the i915 driver
    for the Linux kernel. A local attacker could use this to cause a
    denial of service (system crash) or possibly execute arbitrary
    code. (CVE-2020-7053)

    It was discovered that the B2C2 FlexCop USB device driver in the
    Linux kernel did not properly validate device metadata. A
    physically proximate attacker could use this to cause a denial of
    service (system crash). (CVE-2019-15291)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1033-oracle - 4.15.0-1033.36
    linux-image-4.15.0-1052-gke - 4.15.0-1052.55
    linux-image-4.15.0-1053-kvm - 4.15.0-1053.53
    linux-image-4.15.0-1055-raspi2 - 4.15.0-1055.59
    linux-image-4.15.0-1060-aws - 4.15.0-1060.62
    linux-image-4.15.0-1072-snapdragon - 4.15.0-1072.79
    linux-image-4.15.0-88-generic - 4.15.0-88.88
    linux-image-4.15.0-88-generic-lpae - 4.15.0-88.88
    linux-image-4.15.0-88-lowlatency - 4.15.0-88.88
    linux-image-aws - 4.15.0.1060.61
    linux-image-aws-lts-18.04 - 4.15.0.1060.61
    linux-image-generic - 4.15.0.88.80
    linux-image-generic-lpae - 4.15.0.88.80
    linux-image-gke - 4.15.0.1052.56
    linux-image-gke-4.15 - 4.15.0.1052.56
    linux-image-kvm - 4.15.0.1053.53
    linux-image-lowlatency - 4.15.0.88.80
    linux-image-oracle - 4.15.0.1033.38
    linux-image-oracle-lts-18.04 - 4.15.0.1033.38
    linux-image-powerpc-e500mc - 4.15.0.88.80
    linux-image-powerpc-smp - 4.15.0.88.80
    linux-image-powerpc64-emb - 4.15.0.88.80
    linux-image-powerpc64-smp - 4.15.0.88.80
    linux-image-raspi2 - 4.15.0.1055.53
    linux-image-snapdragon - 4.15.0.1072.75
    linux-image-virtual - 4.15.0.88.80

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1033-oracle - 4.15.0-1033.36~16.04.1
    linux-image-4.15.0-1055-gcp - 4.15.0-1055.59
    linux-image-4.15.0-1060-aws - 4.15.0-1060.62~16.04.1
    linux-image-4.15.0-1071-azure - 4.15.0-1071.76
    linux-image-4.15.0-88-generic - 4.15.0-88.88~16.04.1
    linux-image-4.15.0-88-generic-lpae - 4.15.0-88.88~16.04.1
    linux-image-4.15.0-88-lowlatency - 4.15.0-88.88~16.04.1
    linux-image-aws-hwe - 4.15.0.1060.60
    linux-image-azure - 4.15.0.1071.74
    linux-image-gcp - 4.15.0.1055.69
    linux-image-generic-hwe-16.04 - 4.15.0.88.98
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.88.98
    linux-image-gke - 4.15.0.1055.69
    linux-image-lowlatency-hwe-16.04 - 4.15.0.88.98
    linux-image-oem - 4.15.0.88.98
    linux-image-oracle - 4.15.0.1033.26
    linux-image-virtual-hwe-16.04 - 4.15.0.88.98

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2019-15099
    * CVE-2019-15291
    * CVE-2019-16229
    * CVE-2019-16232
    * CVE-2019-18683
    * CVE-2019-18786
    * CVE-2019-18809
    * CVE-2019-18885
    * CVE-2019-19057
    * CVE-2019-19062
    * CVE-2019-19063
    * CVE-2019-19071
    * CVE-2019-19078
    * CVE-2019-19082
    * CVE-2019-19227
    * CVE-2019-19332
    * CVE-2019-19767
    * CVE-2019-19965
    * CVE-2019-20096
    * CVE-2019-5108
    * CVE-2020-7053

    --- Mystic BBS v1.12 A44 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, February 18, 2020 20:10:04
    linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-oracle-5.0 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the Linux kernel did not properly clear
    data structures on context switches for certain Intel graphics
    processors. A local attacker could use this to expose sensitive
    information. (CVE-2019-14615)

    It was discovered that the HSA Linux kernel driver for AMD GPU
    devices did not properly check for errors in certain situations,
    leading to a NULL pointer dereference. A local attacker could
    possibly use this to cause a denial of service. (CVE-2019-16229)

    It was discovered that the Marvell 8xxx Libertas WLAN device
    driver in the Linux kernel did not properly check for errors in
    certain situations, leading to a NULL pointer dereference. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2019-16232)

    It was discovered that the Renesas Digital Radio Interface (DRIF)
    driver in the Linux kernel did not properly initialize data. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory) (CVE-2019-18786).

    It was discovered that the Afatech AF9005 DVB-T USB device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-18809)

    It was discovered that multiple memory leaks existed in the
    Marvell WiFi-Ex Driver for the Linux kernel. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19057)

    It was discovered that the Realtek rtlwifi USB device driver in
    the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19063)

    It was discovered that the Kvaser CAN/USB driver in the Linux
    kernel did not properly initialize memory in certain situations. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-19947)

    Gao Chuan discovered that the SAS Class driver in the Linux kernel
    contained a race condition that could lead to a NULL pointer
    dereference. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19965)

    It was discovered that the Datagram Congestion Control Protocol
    (DCCP) implementation in the Linux kernel did not properly
    deallocate memory in certain error conditions. An attacker could
    possibly use this to cause a denial of service (kernel memory
    exhaustion). (CVE-2019-20096)

    Mitchell Frank discovered that the Wi-Fi implementation in the
    Linux kernel when used as an access point would send IAPP location
    updates for stations before client authentication had completed. A
    physically proximate attacker could use this to cause a denial of
    service. (CVE-2019-5108)

    It was discovered that a race condition can lead to a
    use-after-free while destroying GEM contexts in the i915 driver
    for the Linux kernel. A local attacker could use this to cause a
    denial of service (system crash) or possibly execute arbitrary
    code. (CVE-2020-7053)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1011-oracle - 5.0.0-1011.16
    linux-image-5.0.0-1025-aws - 5.0.0-1025.28
    linux-image-5.0.0-1030-gke - 5.0.0-1030.31
    linux-image-5.0.0-1031-gcp - 5.0.0-1031.32
    linux-image-5.0.0-1032-azure - 5.0.0-1032.34
    linux-image-azure - 5.0.0.1032.43
    linux-image-gcp - 5.0.0.1031.35
    linux-image-gke-5.0 - 5.0.0.1030.18

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-14615
    * CVE-2019-16229
    * CVE-2019-16232
    * CVE-2019-18786
    * CVE-2019-18809
    * CVE-2019-19057
    * CVE-2019-19063
    * CVE-2019-19947
    * CVE-2019-19965
    * CVE-2019-20096
    * CVE-2019-5108
    * CVE-2020-7053

    --- Mystic BBS v1.12 A44 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, March 17, 2020 00:10:05
    linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    Gregory Herrero discovered that the fix for CVE-2019-14615 to
    address the Linux kernel not properly clearing data structures on
    context switches for certain Intel graphics processors was
    incomplete. A local attacker could use this to expose sensitive
    information. (CVE-2020-8832)

    It was discovered that the IPMI message handler implementation in
    the Linux kernel did not properly deallocate memory in certain
    situations. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19046)

    It was discovered that the Intel WiMAX 2400 driver in the Linux
    kernel did not properly deallocate memory in certain situations. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19051)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    It was discovered that ZR364XX Camera USB device driver for the
    Linux kernel did not properly initialize memory. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-15217)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1055-gke - 4.15.0-1055.58
    linux-image-4.15.0-1056-kvm - 4.15.0-1056.57
    linux-image-4.15.0-1057-raspi2 - 4.15.0-1057.61
    linux-image-4.15.0-1063-aws - 4.15.0-1063.67
    linux-image-4.15.0-1074-snapdragon - 4.15.0-1074.81
    linux-image-4.15.0-91-generic - 4.15.0-91.92
    linux-image-4.15.0-91-generic-lpae - 4.15.0-91.92
    linux-image-4.15.0-91-lowlatency - 4.15.0-91.92
    linux-image-aws - 4.15.0.1063.64
    linux-image-aws-lts-18.04 - 4.15.0.1063.64
    linux-image-generic - 4.15.0.91.83
    linux-image-generic-lpae - 4.15.0.91.83
    linux-image-gke - 4.15.0.1055.59
    linux-image-gke-4.15 - 4.15.0.1055.59
    linux-image-kvm - 4.15.0.1056.56
    linux-image-lowlatency - 4.15.0.91.83
    linux-image-powerpc-e500mc - 4.15.0.91.83
    linux-image-powerpc-smp - 4.15.0.91.83
    linux-image-powerpc64-emb - 4.15.0.91.83
    linux-image-powerpc64-smp - 4.15.0.91.83
    linux-image-raspi2 - 4.15.0.1057.55
    linux-image-snapdragon - 4.15.0.1074.77
    linux-image-virtual - 4.15.0.91.83

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1058-gcp - 4.15.0-1058.62
    linux-image-4.15.0-1063-aws - 4.15.0-1063.67~16.04.1
    linux-image-4.15.0-91-generic - 4.15.0-91.92~16.04.1
    linux-image-4.15.0-91-generic-lpae - 4.15.0-91.92~16.04.1
    linux-image-4.15.0-91-lowlatency - 4.15.0-91.92~16.04.1
    linux-image-aws-hwe - 4.15.0.1063.63
    linux-image-gcp - 4.15.0.1058.72
    linux-image-generic-hwe-16.04 - 4.15.0.91.101
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.91.101
    linux-image-gke - 4.15.0.1058.72
    linux-image-lowlatency-hwe-16.04 - 4.15.0.91.101
    linux-image-oem - 4.15.0.91.101
    linux-image-virtual-hwe-16.04 - 4.15.0.91.101

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-15217
    * CVE-2019-19046
    * CVE-2019-19051
    * CVE-2019-19056
    * CVE-2019-19058
    * CVE-2019-19066
    * CVE-2019-19068
    * CVE-2020-2732
    * CVE-2020-8832

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:1/100 to Ubuntu Users on Tuesday, March 17, 2020 00:10:05
    linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-oracle-5.0
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the KVM implementation in the Linux kernel,
    when paravirtual TLB flushes are enabled in guests, the hypervisor
    in some situations could miss deferred TLB flushes or otherwise
    mishandle them. An attacker in a guest VM could use this to expose
    sensitive information (read memory from another guest VM).
    (CVE-2019-3016)

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    It was discovered that the RPMSG character device interface in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19053)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058, CVE-2019-19059)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    Update instructiod
    SEEN-BY: 1/1 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 SEEN-BY: 1/116 117 118 119 120 121 122 124 125 126 127 128 129 130 131 133 134 SEEN-BY: 1/135 136 137 138 139 140 141 143 144 145 146 147 148 149 150 152 153 SEEN-BY: 1/154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 171 SEEN-BY: 1/172 173 174 175 176 177 178 180 181 182 183 184 185 186 187 188 189 SEEN-BY: 1/190 191 192 193 194 197 198 199 200 201 202 203 204 205 206 207 208 SEEN-BY: 1/209 995 2/100 3/100 4/100 5/100
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, March 17, 2020 00:10:05
    linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.3 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi 2

    Details

    It was discovered that the KVM implementation in the Linux kernel,
    when paravirtual TLB flushes are enabled in guests, the hypervisor
    in some situations could miss deferred TLB flushes or otherwise
    mishandle them. An attacker in a guest VM could use this to expose
    sensitive information (read memory from another guest VM).
    (CVE-2019-3016)

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    It was discovered that the Afatech AF9005 DVB-T USB device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-18809)

    It was discovered that the Intel(R) XL710 Ethernet Controller
    device driver in the Linux kernel did not properly deallocate
    memory in certain error conditions. A local attacker could
    possibly use this to cause a denial of service (kernel memory
    exhaustion). (CVE-2019-19043)

    It was discovered that the RPMSG character device interface in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19053)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058, CVE-2019-19059)

    It was discovered that the Serial Peripheral Interface (SPI)
    driver in the Linux kernel device driver in the Linux kernel did
    not properly deallocate memory in certain error conditions. A
    local attacker could possibly use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19064)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1011-oracle - 5.3.0-1011.12
    linux-image-5.3.0-1012-kvm - 5.3.0-1012.13
    linux-image-5.3.0-1013-aws - 5.3.0-1013.14
    linux-image-5.3.0-1014-gcp - 5.3.0-1014.15
    linux-image-5.3.0-1019-raspi2 - 5.3.0-1019.21
    linux-image-5.3.0-42-generic - 5.3.0-42.34
    linux-image-5.3.0-42-generic-lpae - 5.3.0-42.34
    linux-image-5.3.0-42-lowlatency - 5.3.0-42.34
    linux-image-5.3.0-42-snapdragon - 5.3.0-42.34
    linux-image-aws - 5.3.0.1013.15
    linux-image-gcp - 5.3.0.1014.15
    linux-image-generic - 5.3.0.42.36
    linux-image-generic-lpae - 5.3.0.42.36
    linux-image-gke - 5.3.0.1014.15
    linux-image-kvm - 5.3.0.1012.14
    linux-image-lowlatency - 5.3.0.42.36
    linux-image-oracle - 5.3.0.1011.12
    linux-image-raspi2 - 5.3.0.1019.16
    linux-image-snapdragon - 5.3.0.42.36
    linux-image-virtual - 5.3.0.42.36

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1014-gcp - 5.3.0-1014.15~18.04.1
    linux-image-5.3.0-1014-gke - 5.3.0-1014.15~18.04.1
    linux-image-5.3.0-1019-raspi2 - 5.3.0-1019.21~18.04.1
    linux-image-5.3.0-42-generic - 5.3.0-42.34~18.04.1
    linux-image-5.3.0-42-generic-lpae - 5.3.0-42.34~18.04.1
    linux-image-5.3.0-42-lowlatency - 5.3.0-42.34~18.04.1
    linux-image-gcp-edge - 5.3.0.1014.13
    linux-image-generic-hwe-18.04 - 5.3.0.42.99
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.42.99
    linux-image-gke-5.3 - 5.3.0.1014.4
    linux-image-lowlatency-hwe-18.04 - 5.3.0.42.99
    linux-image-raspi2-hwe-18.04 - 5.3.0.1019.8
    linux-image-snapdragon-hwe-18.04 - 5.3.0.42.99
    linux-image-virtual-hwe-18.04 - 5.3.0.42.99

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-18809
    * CVE-2019-19043
    * CVE-2019-19053
    * CVE-2019-19056
    * CVE-2019-19058
    * CVE-2019-19059
    * CVE-2019-19064
    * CVE-2019-19066
    * CVE-2019-19068
    * CVE-2019-3016
    * CVE-2020-2732

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, March 25, 2020 00:10:06
    linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon,
    linux-azure vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM processors
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    Gregory Herrero discovered that the fix for CVE-2019-14615 to
    address the Linux kernel not properly clearing data structures on
    context switches for certain Intel graphics processors was
    incomplete. A local attacker could use this to expose sensitive
    information. (CVE-2020-8832)

    It was discovered that the IPMI message handler implementation in
    the Linux kernel did not properly deallocate memory in certain
    situations. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19046)

    It was discovered that the Intel WiMAX 2400 driver in the Linux
    kernel did not properly deallocate memory in certain situations. A
    local attacker could use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19051)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    It was discovered that ZR364XX Camera USB device driver for the
    Linux kernel did not properly initialize memory. A physically
    proximate attacker could use this to cause a denial of service
    (system crash). (CVE-2019-15217)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1035-oracle - 4.15.0-1035.39
    linux-image-4.15.0-1055-gke - 4.15.0-1055.58
    linux-image-4.15.0-1056-kvm - 4.15.0-1056.57
    linux-image-4.15.0-1057-raspi2 - 4.15.0-1057.61
    linux-image-4.15.0-1063-aws - 4.15.0-1063.67
    linux-image-4.15.0-1074-snapdragon - 4.15.0-1074.81
    linux-image-4.15.0-1076-oem - 4.15.0-1076.86
    linux-image-4.15.0-91-generic - 4.15.0-91.92
    linux-image-4.15.0-91-generic-lpae - 4.15.0-91.92
    linux-image-4.15.0-91-lowlatency - 4.15.0-91.92
    linux-image-aws - 4.15.0.1063.64
    linux-image-aws-lts-18.04 - 4.15.0.1063.64
    linux-image-generic - 4.15.0.91.83
    linux-image-generic-lpae - 4.15.0.91.83
    linux-image-gke - 4.15.0.1055.59
    linux-image-gke-4.15 - 4.15.0.1055.59
    linux-image-kvm - 4.15.0.1056.56
    linux-image-lowlatency - 4.15.0.91.83
    linux-image-oem - 4.15.0.1076.80
    linux-image-oracle-lts-18.04 - 4.15.0.1035.43
    linux-image-powerpc-e500mc - 4.15.0.91.83
    linux-image-powerpc-smp - 4.15.0.91.83
    linux-image-powerpc64-emb - 4.15.0.91.83
    linux-image-powerpc64-smp - 4.15.0.91.83
    linux-image-raspi2 - 4.15.0.1057.55
    linux-image-snapdragon - 4.15.0.1074.77
    linux-image-virtual - 4.15.0.91.83

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1035-oracle - 4.15.0-1035.38~16.04.1
    linux-image-4.15.0-1058-gcp - 4.15.0-1058.62
    linux-image-4.15.0-1063-aws - 4.15.0-1063.67~16.04.1
    linux-image-4.15.0-1075-azure - 4.15.0-1075.80
    linux-image-4.15.0-91-generic - 4.15.0-91.92~16.04.1
    linux-image-4.15.0-91-generic-lpae - 4.15.0-91.92~16.04.1
    linux-image-4.15.0-91-lowlatency - 4.15.0-91.92~16.04.1
    linux-image-aws-hwe - 4.15.0.1063.63
    linux-image-azure - 4.15.0.1075.78
    linux-image-gcp - 4.15.0.1058.72
    linux-image-generic-hwe-16.04 - 4.15.0.91.101
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.91.101
    linux-image-gke - 4.15.0.1058.72
    linux-image-lowlatency-hwe-16.04 - 4.15.0.91.101
    linux-image-oem - 4.15.0.91.101
    linux-image-oracle - 4.15.0.1035.28
    linux-image-virtual-hwe-16.04 - 4.15.0.91.101

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1074-azure - 4.15.0-1074.79~14.04.1
    linux-image-azure - 4.15.0.1074.60

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-15217
    * CVE-2019-19046
    * CVE-2019-19051
    * CVE-2019-19056
    * CVE-2019-19058
    * CVE-2019-19066
    * CVE-2019-19068
    * CVE-2020-2732
    * CVE-2020-8832

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, March 25, 2020 00:10:06
    linux-aws-5.0, linux-gcp, linux-gke-5.0, linux-oracle-5.0, linux-azure vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-aws-5.0 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM processors
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the KVM implementation in the Linux kernel,
    when paravirtual TLB flushes are enabled in guests, the hypervisor
    in some situations could miss deferred TLB flushes or otherwise
    mishandle them. An attacker in a guest VM could use this to expose
    sensitive information (read memory from another guest VM).
    (CVE-2019-3016)

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    It was discovered that the RPMSG character device interface in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19053)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058, CVE-2019-19059)

    It was discovered that the Brocade BFA Fibre Channel device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19066)

    It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-19068)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1013-oracle - 5.0.0-1013.18
    linux-image-5.0.0-1027-aws - 5.0.0-1027.30
    linux-image-5.0.0-1032-gke - 5.0.0-1032.33
    linux-image-5.0.0-1033-gcp - 5.0.0-1033.34
    linux-image-5.0.0-1035-azure - 5.0.0-1035.37
    linux-image-5.0.0-1043-oem-osp1 - 5.0.0-1043.48
    linux-image-aws-edge - 5.0.0.1027.41
    linux-image-azure - 5.0.0.1035.46
    linux-image-gcp - 5.0.0.1033.37
    linux-image-gke-5.0 - 5.0.0.1032.20
    linux-image-oem-osp1 - 5.0.0.1043.48
    linux-image-oracle - 5.0.0.1013.13

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-19053
    * CVE-2019-19056
    * CVE-2019-19058
    * CVE-2019-19059
    * CVE-2019-19066
    * CVE-2019-19068
    * CVE-2019-3016
    * CVE-2020-2732

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:1/100 to Ubuntu Users on Wednesday, March 25, 2020 00:10:06
    linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3, linux-azure, linux-azure-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-azure-5.3 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.3 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi 2

    Details

    It was discovered that the KVM implementation in the Linux kernel,
    when paravirtual TLB flushes are enabled in guests, the hypervisor
    in some situations could miss deferred TLB flushes or otherwise
    mishandle them. An attacker in a guest VM could use this to expose
    sensitive information (read memory from another guest VM).
    (CVE-2019-3016)

    Paulo Bonzini discovered that the KVM hypervisor implementation in
    the Linux kernel could improperly let a nested (level 2) guest
    access the resources of a parent (level 1) guest in certain
    situations. An attacker could use this to expose sensitive
    information. (CVE-2020-2732)

    It was discovered that the Afatech AF9005 DVB-T USB device driver
    in the Linux kernel did not properly deallocate memory in certain
    error conditions. A local attacker could possibly use this to
    cause a denial of service (kernel memory exhaustion).
    (CVE-2019-18809)

    It was discovered that the Intel(R) XL710 Ethernet Controller
    device driver in the Linux kernel did not properly deallocate
    memory in certain error conditions. A local attacker could
    possibly use this to cause a denial of service (kernel memory
    exhaustion). (CVE-2019-19043)

    It was discovered that the RPMSG character device interface in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19053)

    It was discovered that the Marvell Wi-Fi device driver in the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to possibly cause a
    denial of service (kernel memory exhaustion). (CVE-2019-19056)

    It was discovered that the Intel(R) Wi-Fi device driver in the
    Linux kernel device driver in the Linux kernel did not properly
    deallocate memory in certain error conditions. A local attacker
    could possibly use this to cause a denial of service (kernel
    memory exhaustion). (CVE-2019-19058, CVE-2019-19059)

    It was discovered that the Serial Peripheral Interface (SPI)
    driver in the Linux kernel device driver in the Linux kernel did
    not properly deallocate memory in certain error conditions. A
    d
    SEEN-BY: 1/1 100 101 102 103 104 105 106 107 109 110 111 112 113 114 115 116 SEEN-BY: 1/117 118 119 120 121 122 124 125 126 127 128 129 130 131 133 134 135 SEEN-BY: 1/136 137 138 139 140 141 143 144 145 146 147 148 149 150 152 153 154 SEEN-BY: 1/155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 171 172 SEEN-BY: 1/173 174 175 176 177 178 180 181 182 183 184 185 186 187 188 189 190 SEEN-BY: 1/191 192 193 194 197 198 199 200 201 202 203 204 205 206 207 208 209 SEEN-BY: 1/995 2/100 3/100 4/100 5/100
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Monday, April 06, 2020 20:10:09
    linux, linux-hwe vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Al Viro discovered that the vfs layer in the Linux kernel
    contained a use- after-free vulnerability. A local attacker could
    use this to cause a denial of service (system crash) or possibly
    expose sensitive information (kernel memory). (CVE-2020-8428)

    Gustavo Romero and Paul Mackerras discovered that the KVM
    implementation in the Linux kernel for PowerPC processors did not
    properly keep guest state separate from host state. A local
    attacker in a KVM guest could use this to cause a denial of
    service (host system crash). (CVE-2020-8834)

    Shijie Luo discovered that the ext4 file system implementation in
    the Linux kernel did not properly check for a too-large journal
    size. An attacker could use this to construct a malicious ext4
    image that, when mounted, could cause a denial of service (soft
    lockup). (CVE-2020-8992)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-96-generic - 4.15.0-96.97
    linux-image-4.15.0-96-generic-lpae - 4.15.0-96.97
    linux-image-4.15.0-96-lowlatency - 4.15.0-96.97
    linux-image-generic - 4.15.0.96.87
    linux-image-generic-lpae - 4.15.0.96.87
    linux-image-lowlatency - 4.15.0.96.87
    linux-image-powerpc-e500mc - 4.15.0.96.87
    linux-image-powerpc-smp - 4.15.0.96.87
    linux-image-powerpc64-emb - 4.15.0.96.87
    linux-image-powerpc64-smp - 4.15.0.96.87
    linux-image-virtual - 4.15.0.96.87

    Ubuntu 16.04 LTS
    linux-image-4.15.0-96-generic - 4.15.0-96.97~16.04.1
    linux-image-4.15.0-96-generic-lpae - 4.15.0-96.97~16.04.1
    linux-image-4.15.0-96-lowlatency - 4.15.0-96.97~16.04.1
    linux-image-generic-hwe-16.04 - 4.15.0.96.104
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.96.104
    linux-image-lowlatency-hwe-16.04 - 4.15.0.96.104
    linux-image-oem - 4.15.0.96.104
    linux-image-virtual-hwe-16.04 - 4.15.0.96.104

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-8428
    * CVE-2020-8834
    * CVE-2020-8992

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Monday, April 06, 2020 20:10:09
    linux, linux-aws, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm,
    linux-oracle, linux-oracle-5.3, linux-raspi2, linux-raspi2-5.3
    vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oracle-5.3 - Linux kernel Oracle Cloud systems
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi 2

    Details

    It was discovered that the IPMI message handler implementation in
    the Linux kernel did not properly deallocate memory in certain
    situations. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19046)

    Al Viro discovered that the vfs layer in the Linux kernel
    contained a use- after-free vulnerability. A local attacker could
    use this to cause a denial of service (system crash) or possibly
    expose sensitive information (kernel memory). (CVE-2020-8428)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1014-oracle - 5.3.0-1014.15
    linux-image-5.3.0-1015-kvm - 5.3.0-1015.16
    linux-image-5.3.0-1016-aws - 5.3.0-1016.17
    linux-image-5.3.0-1017-gcp - 5.3.0-1017.18
    linux-image-5.3.0-1022-raspi2 - 5.3.0-1022.24
    linux-image-5.3.0-46-generic - 5.3.0-46.38
    linux-image-5.3.0-46-generic-lpae - 5.3.0-46.38
    linux-image-5.3.0-46-lowlatency - 5.3.0-46.38
    linux-image-5.3.0-46-snapdragon - 5.3.0-46.38
    linux-image-aws - 5.3.0.1016.18
    linux-image-gcp - 5.3.0.1017.18
    linux-image-generic - 5.3.0.46.39
    linux-image-generic-lpae - 5.3.0.46.39
    linux-image-gke - 5.3.0.1017.18
    linux-image-kvm - 5.3.0.1015.17
    linux-image-lowlatency - 5.3.0.46.39
    linux-image-oracle - 5.3.0.1014.15
    linux-image-raspi2 - 5.3.0.1022.19
    linux-image-snapdragon - 5.3.0.46.39
    linux-image-virtual - 5.3.0.46.39

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1014-oracle - 5.3.0-1014.15~18.04.1
    linux-image-5.3.0-1017-gcp - 5.3.0-1017.18~18.04.1
    linux-image-5.3.0-1022-raspi2 - 5.3.0-1022.24~18.04.1
    linux-image-5.3.0-46-generic - 5.3.0-46.38~18.04.1
    linux-image-5.3.0-46-generic-lpae - 5.3.0-46.38~18.04.1
    linux-image-5.3.0-46-lowlatency - 5.3.0-46.38~18.04.1
    linux-image-gcp-edge - 5.3.0.1017.16
    linux-image-generic-hwe-18.04 - 5.3.0.46.102
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.46.102
    linux-image-lowlatency-hwe-18.04 - 5.3.0.46.102
    linux-image-oracle-edge - 5.3.0.1014.13
    linux-image-raspi2-hwe-18.04 - 5.3.0.1022.11
    linux-image-snapdragon-hwe-18.04 - 5.3.0.46.102
    linux-image-virtual-hwe-18.04 - 5.3.0.46.102

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-19046
    * CVE-2020-8428

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, April 07, 2020 20:10:03
    linux-azure, linux-gcp, linux-gke-5.0, linux-oem-osp1, linux-oracle-5.0 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM processors
    * linux-oracle-5.0 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the IPMI message handler implementation in
    the Linux kernel did not properly deallocate memory in certain
    situations. A local attacker could use this to cause a denial of
    service (kernel memory exhaustion). (CVE-2019-19046)

    Al Viro discovered that the vfs layer in the Linux kernel
    contained a use- after-free vulnerability. A local attacker could
    use this to cause a denial of service (system crash) or possibly
    expose sensitive information (kernel memory). (CVE-2020-8428)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1014-oracle - 5.0.0-1014.19
    linux-image-5.0.0-1033-gke - 5.0.0-1033.34
    linux-image-5.0.0-1034-gcp - 5.0.0-1034.35
    linux-image-5.0.0-1036-azure - 5.0.0-1036.38
    linux-image-5.0.0-1047-oem-osp1 - 5.0.0-1047.52
    linux-image-azure - 5.0.0.1036.47
    linux-image-gcp - 5.0.0.1034.38
    linux-image-gke-5.0 - 5.0.0.1033.21
    linux-image-oem-osp1 - 5.0.0.1047.50
    linux-image-oracle - 5.0.0.1014.15

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-19046
    * CVE-2020-8428

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, April 07, 2020 20:10:03
    linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15,
    linux-kvm, linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM processors
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi 2
    * linux-snapdragon - Linux kernel for Snapdragon processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems

    Details

    Al Viro discovered that the vfs layer in the Linux kernel
    contained a use- after-free vulnerability. A local attacker could
    use this to cause a denial of service (system crash) or possibly
    expose sensitive information (kernel memory). (CVE-2020-8428)

    Shijie Luo discovered that the ext4 file system implementation in
    the Linux kernel did not properly check for a too-large journal
    size. An attacker could use this to construct a malicious ext4
    image that, when mounted, could cause a denial of service (soft
    lockup). (CVE-2020-8992)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1037-oracle - 4.15.0-1037.41
    linux-image-4.15.0-1057-gke - 4.15.0-1057.60
    linux-image-4.15.0-1058-kvm - 4.15.0-1058.59
    linux-image-4.15.0-1060-raspi2 - 4.15.0-1060.64
    linux-image-4.15.0-1065-aws - 4.15.0-1065.69
    linux-image-4.15.0-1076-snapdragon - 4.15.0-1076.83
    linux-image-4.15.0-1079-oem - 4.15.0-1079.89
    linux-image-aws - 4.15.0.1065.67
    linux-image-aws-lts-18.04 - 4.15.0.1065.67
    linux-image-gke - 4.15.0.1057.61
    linux-image-gke-4.15 - 4.15.0.1057.61
    linux-image-kvm - 4.15.0.1058.58
    linux-image-oem - 4.15.0.1079.83
    linux-image-oracle-lts-18.04 - 4.15.0.1037.45
    linux-image-raspi2 - 4.15.0.1060.58
    linux-image-snapdragon - 4.15.0.1076.79

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1037-oracle - 4.15.0-1037.41~16.04.1
    linux-image-4.15.0-1060-gcp - 4.15.0-1060.64
    linux-image-4.15.0-1065-aws - 4.15.0-1065.69~16.04.1
    linux-image-4.15.0-1077-azure - 4.15.0-1077.82
    linux-image-aws-hwe - 4.15.0.1065.65
    linux-image-azure - 4.15.0.1077.80
    linux-image-azure-edge - 4.15.0.1077.80
    linux-image-gcp - 4.15.0.1060.74
    linux-image-gke - 4.15.0.1060.74
    linux-image-oracle - 4.15.0.1037.30

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1077-azure - 4.15.0-1077.82~14.04.1
    linux-image-azure - 4.15.0.1077.62

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-8428
    * CVE-2020-8992

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 12.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel

    Details

    It was discovered that the Marvell WiFi-Ex Driver in the Linux
    kernel did not properly validate status lengths in messages
    received from an access point, leading to a buffer overflow. A
    physically proximate attacker controlling an access point could
    use this to construct messages that could possibly result in
    arbitrary code execution. (CVE-2020-12654)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 12.04 ESM
    linux-image-3.2.0-147-generic - 3.2.0-147.194
    linux-image-3.2.0-147-generic-pae - 3.2.0-147.194
    linux-image-3.2.0-147-highbank - 3.2.0-147.194
    linux-image-3.2.0-147-powerpc-smp - 3.2.0-147.194
    linux-image-3.2.0-147-powerpc64-smp - 3.2.0-147.194
    linux-image-3.2.0-147-virtual - 3.2.0-147.194
    linux-image-generic - 3.2.0.147.161
    linux-image-generic-pae - 3.2.0.147.161
    linux-image-highbank - 3.2.0.147.161
    linux-image-powerpc - 3.2.0.147.161
    linux-image-powerpc-smp - 3.2.0.147.161
    linux-image-powerpc64-smp - 3.2.0.147.161
    linux-image-server - 3.2.0.147.161
    linux-image-virtual - 3.2.0.147.161

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0543
    * CVE-2020-12654
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux, linux-lts-trusty vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 14.04 ESM
    * Ubuntu 12.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-lts-trusty - Linux hardware enablement kernel from
    Trusty for Precise ESM

    Details

    It was discovered that the Marvell WiFi-Ex Driver in the Linux
    kernel did not properly validate status lengths in messages
    received from an access point, leading to a buffer overflow. A
    physically proximate attacker controlling an access point could
    use this to construct messages that could possibly result in
    arbitrary code execution. (CVE-2020-12654)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 14.04 ESM
    linux-image-3.13.0-180-generic - 3.13.0-180.231
    linux-image-3.13.0-180-generic-lpae - 3.13.0-180.231
    linux-image-3.13.0-180-lowlatency - 3.13.0-180.231
    linux-image-3.13.0-180-powerpc-e500 - 3.13.0-180.231
    linux-image-3.13.0-180-powerpc-e500mc - 3.13.0-180.231
    linux-image-3.13.0-180-powerpc-smp - 3.13.0-180.231
    linux-image-3.13.0-180-powerpc64-emb - 3.13.0-180.231
    linux-image-3.13.0-180-powerpc64-smp - 3.13.0-180.231
    linux-image-generic - 3.13.0.180.189
    linux-image-generic-lpae - 3.13.0.180.189
    linux-image-highbank - 3.13.0.180.189
    linux-image-lowlatency - 3.13.0.180.189
    linux-image-omap - 3.13.0.180.189
    linux-image-powerpc-e500 - 3.13.0.180.189
    linux-image-powerpc-e500mc - 3.13.0.180.189
    linux-image-powerpc-smp - 3.13.0.180.189
    linux-image-powerpc64-emb - 3.13.0.180.189
    linux-image-powerpc64-smp - 3.13.0.180.189
    linux-image-server - 3.13.0.180.189
    linux-image-virtual - 3.13.0.180.189

    Ubuntu 12.04 ESM
    linux-image-3.13.0-180-generic - 3.13.0-180.231~12.04.1
    linux-image-3.13.0-180-generic-lpae -
    3.13.0-180.231~12.04.1
    linux-image-3.13.0-180-lowlatency - 3.13.0-180.231~12.04.1
    linux-image-generic-lpae-lts-trusty - 3.13.0.180.166
    linux-image-generic-lts-trusty - 3.13.0.180.166

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0543
    * CVE-2020-12114
    * CVE-2020-12654
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux, linux-aws, linux-kvm vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that the ext4 file system implementation in the
    Linux kernel did not properly handle setxattr operations in some
    situations. A local attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2019-19319)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    It was discovered that the USB susbsystem's scatter-gather
    implementation in the Linux kernel did not properly take data
    references in some situations, leading to a use-after-free. A
    physically proximate attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12464)

    It was discovered that the DesignWare SPI controller driver in the
    Linux kernel contained a race condition. A local attacker could
    possibly use this to cause a denial of service (system crash).
    (CVE-2020-12769)

    It was discovered that the exit signaling implementation in the
    Linux kernel contained an integer overflow. A local attacker could
    use this to cause a denial of service (arbitrary application
    crash). (CVE-2020-12826)

    Xiumei Mu discovered that the IPSec implementation in the Linux
    kernel did not properly encrypt IPv6 traffic in some situations.
    An attacker could use this to expose sensitive information.
    (CVE-2020-1749)

    Dmitry Vyukov discovered that the SELinux netlink security hook in
    the Linux kernel did not validate messages in some situations. A
    privileged attacker could use this to bypass SELinux netlink
    restrictions. (CVE-2020-10751)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1075-kvm - 4.4.0-1075.82
    linux-image-4.4.0-1109-aws - 4.4.0-1109.120
    linux-image-4.4.0-184-generic - 4.4.0-184.214
    linux-image-4.4.0-184-generic-lpae - 4.4.0-184.214
    linux-image-4.4.0-184-lowlatency - 4.4.0-184.214
    linux-image-4.4.0-184-powerpc-e500mc - 4.4.0-184.214
    linux-image-4.4.0-184-powerpc-smp - 4.4.0-184.214
    linux-image-4.4.0-184-powerpc64-emb - 4.4.0-184.214
    linux-image-4.4.0-184-powerpc64-smp - 4.4.0-184.214
    linux-image-aws - 4.4.0.1109.113
    linux-image-generic - 4.4.0.184.190
    linux-image-generic-lpae - 4.4.0.184.190
    linux-image-kvm - 4.4.0.1075.73
    linux-image-lowlatency - 4.4.0.184.190
    linux-image-powerpc-e500mc - 4.4.0.184.190
    linux-image-powerpc-smp - 4.4.0.184.190
    linux-image-powerpc64-emb - 4.4.0.184.190
    linux-image-powerpc64-smp - 4.4.0.184.190
    linux-image-virtual - 4.4.0.184.190

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1073-aws - 4.4.0-1073.77
    linux-image-4.4.0-184-generic - 4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-generic-lpae - 4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-lowlatency - 4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-powerpc-e500mc -
    4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-powerpc-smp - 4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-powerpc64-emb -
    4.4.0-184.214~14.04.1
    linux-image-4.4.0-184-powerpc64-smp -
    4.4.0-184.214~14.04.1
    linux-image-aws - 4.4.0.1073.70
    linux-image-generic-lpae-lts-xenial - 4.4.0.184.161
    linux-image-generic-lts-xenial - 4.4.0.184.161
    linux-image-lowlatency-lts-xenial - 4.4.0.184.161
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.184.161
    linux-image-powerpc-smp-lts-xenial - 4.4.0.184.161
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.184.161
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.184.161
    linux-image-virtual-lts-xenial - 4.4.0.184.161

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-19319
    * CVE-2020-0543
    * CVE-2020-10751
    * CVE-2020-12114
    * CVE-2020-12464
    * CVE-2020-12769
    * CVE-2020-12826
    * CVE-2020-1749
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
    linux-gcp, linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that the F2FS file system implementation in the
    Linux kernel did not properly perform bounds checking on xattrs in
    some situations. A local attacker could possibly use this to
    expose sensitive information (kernel memory). (CVE-2020-0067)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    It was discovered that the USB susbsystem's scatter-gather
    implementation in the Linux kernel did not properly take data
    references in some situations, leading to a use-after-free. A
    physically proximate attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12464)

    Xiumei Mu discovered that the IPSec implementation in the Linux
    kernel did not properly encrypt IPv6 traffic in some situations.
    An attacker could use this to expose sensitive information.
    (CVE-2020-1749)

    Dmitry Vyukov discovered that the SELinux netlink security hook in
    the Linux kernel did not validate messages in some situations. A
    privileged attacker could use this to bypass SELinux netlink
    restrictions. (CVE-2020-10751)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1045-oracle - 4.15.0-1045.49
    linux-image-4.15.0-106-generic - 4.15.0-106.107
    linux-image-4.15.0-106-generic-lpae - 4.15.0-106.107
    linux-image-4.15.0-106-lowlatency - 4.15.0-106.107
    linux-image-4.15.0-1063-gke - 4.15.0-1063.66
    linux-image-4.15.0-1067-kvm - 4.15.0-1067.68
    linux-image-4.15.0-1073-aws - 4.15.0-1073.77
    linux-image-4.15.0-1087-oem - 4.15.0-1087.97
    linux-image-4.15.0-1089-azure - 4.15.0-1089.99
    linux-image-aws-lts-18.04 - 4.15.0.1073.76
    linux-image-azure-lts-18.04 - 4.15.0.1089.60
    linux-image-generic - 4.15.0.106.94
    linux-image-generic-lpae - 4.15.0.106.94
    linux-image-gke - 4.15.0.1063.65
    linux-image-gke-4.15 - 4.15.0.1063.65
    linux-image-kvm - 4.15.0.1067.63
    linux-image-lowlatency - 4.15.0.106.94
    linux-image-oem - 4.15.0.1087.91
    linux-image-oracle-lts-18.04 - 4.15.0.1045.54
    linux-image-powerpc-e500mc - 4.15.0.106.94
    linux-image-powerpc-smp - 4.15.0.106.94
    linux-image-powerpc64-emb - 4.15.0.106.94
    linux-image-powerpc64-smp - 4.15.0.106.94
    linux-image-virtual - 4.15.0.106.94

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1045-oracle - 4.15.0-1045.49~16.04.1
    linux-image-4.15.0-106-generic - 4.15.0-106.107~16.04.1
    linux-image-4.15.0-106-generic-lpae -
    4.15.0-106.107~16.04.1
    linux-image-4.15.0-106-lowlatency - 4.15.0-106.107~16.04.1
    linux-image-4.15.0-1073-aws - 4.15.0-1073.77~16.04.1
    linux-image-4.15.0-1077-gcp - 4.15.0-1077.87~16.04.1
    linux-image-4.15.0-1089-azure - 4.15.0-1089.99~16.04.1
    linux-image-aws-hwe - 4.15.0.1073.73
    linux-image-azure - 4.15.0.1089.84
    linux-image-azure-edge - 4.15.0.1089.84
    linux-image-gcp - 4.15.0.1077.79
    linux-image-generic-hwe-16.04 - 4.15.0.106.111
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.106.111
    linux-image-gke - 4.15.0.1077.79
    linux-image-lowlatency-hwe-16.04 - 4.15.0.106.111
    linux-image-oem - 4.15.0.106.111
    linux-image-oracle - 4.15.0.1045.38
    linux-image-virtual-hwe-16.04 - 4.15.0.106.111

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1089-azure - 4.15.0-1089.99~14.04.1
    linux-image-azure - 4.15.0.1089.66

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0067
    * CVE-2020-0543
    * CVE-2020-10751
    * CVE-2020-12114
    * CVE-2020-12464
    * CVE-2020-1749
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the F2FS file system implementation in the
    Linux kernel did not properly perform bounds checking on xattrs in
    some situations. A local attacker could possibly use this to
    expose sensitive information (kernel memory). (CVE-2020-0067)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    It was discovered that the USB susbsystem's scatter-gather
    implementation in the Linux kernel did not properly take data
    references in some situations, leading to a use-after-free. A
    physically proximate attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12464)

    Bui Quang Minh discovered that the XDP socket implementation in
    the Linux kernel did not properly validate meta-data passed from
    user space, leading to an out-of-bounds write vulnerability. A
    local attacker with the CAP_NET_ADMIN capability could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-12659)

    Dmitry Vyukov discovered that the SELinux netlink security hook in
    the Linux kernel did not validate messages in some situations. A
    privileged attacker could use this to bypass SELinux netlink
    restrictions. (CVE-2020-10751)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1015-aws - 5.4.0-1015.15
    linux-image-5.4.0-1015-gcp - 5.4.0-1015.15
    linux-image-5.4.0-1015-kvm - 5.4.0-1015.15
    linux-image-5.4.0-1015-oracle - 5.4.0-1015.15
    linux-image-5.4.0-1016-azure - 5.4.0-1016.16
    linux-image-5.4.0-37-generic - 5.4.0-37.41
    linux-image-5.4.0-37-generic-lpae - 5.4.0-37.41
    linux-image-5.4.0-37-lowlatency - 5.4.0-37.41
    linux-image-aws - 5.4.0.1015.16
    linux-image-azure - 5.4.0.1016.16
    linux-image-gcp - 5.4.0.1015.14
    linux-image-generic - 5.4.0.37.40
    linux-image-generic-hwe-20.04 - 5.4.0.37.40
    linux-image-generic-lpae - 5.4.0.37.40
    linux-image-generic-lpae-hwe-20.04 - 5.4.0.37.40
    linux-image-gke - 5.4.0.1015.14
    linux-image-kvm - 5.4.0.1015.14
    linux-image-lowlatency - 5.4.0.37.40
    linux-image-lowlatency-hwe-20.04 - 5.4.0.37.40
    linux-image-oem - 5.4.0.37.40
    linux-image-oem-osp1 - 5.4.0.37.40
    linux-image-oracle - 5.4.0.1015.14
    linux-image-virtual - 5.4.0.37.40
    linux-image-virtual-hwe-20.04 - 5.4.0.37.40

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0067
    * CVE-2020-0543
    * CVE-2020-10751
    * CVE-2020-12114
    * CVE-2020-12464
    * CVE-2020-12659
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux-gke-5.0, linux-oem-osp1 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM systems

    Details

    It was discovered that the F2FS file system implementation in the
    Linux kernel did not properly perform bounds checking on xattrs in
    some situations. A local attacker could possibly use this to
    expose sensitive information (kernel memory). (CVE-2020-0067)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    It was discovered that the USB susbsystem's scatter-gather
    implementation in the Linux kernel did not properly take data
    references in some situations, leading to a use-after-free. A
    physically proximate attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12464)

    Bui Quang Minh discovered that the XDP socket implementation in
    the Linux kernel did not properly validate meta-data passed from
    user space, leading to an out-of-bounds write vulnerability. A
    local attacker with the CAP_NET_ADMIN capability could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-12659)

    Xiumei Mu discovered that the IPSec implementation in the Linux
    kernel did not properly encrypt IPv6 traffic in some situations.
    An attacker could use this to expose sensitive information.
    (CVE-2020-1749)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1042-gke - 5.0.0-1042.43
    linux-image-5.0.0-1059-oem-osp1 - 5.0.0-1059.64
    linux-image-gke-5.0 - 5.0.0.1042.27
    linux-image-oem-osp1 - 5.0.0.1059.58

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0067
    * CVE-2020-0543
    * CVE-2020-12114
    * CVE-2020-12464
    * CVE-2020-12659
    * CVE-2020-1749
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, June 10, 2020 00:10:03
    linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3,
    linux-gcp, linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm,
    linux-oracle, linux-oracle-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-aws-5.3 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure-5.3 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-5.3 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oracle-5.3 - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the F2FS file system implementation in the
    Linux kernel did not properly perform bounds checking on xattrs in
    some situations. A local attacker could possibly use this to
    expose sensitive information (kernel memory). (CVE-2020-0067)

    It was discovered that memory contents previously stored in
    microarchitectural special registers after RDRAND, RDSEED, and SGX
    EGETKEY read operations on Intel client and Xeon E3 processors may
    be briefly exposed to processes on the same or different processor
    cores. A local attacker could use this to expose sensitive
    information. (CVE-2020-0543)

    Piotr Krysiuk discovered that race conditions existed in the file
    system implementation in the Linux kernel. A local attacker could
    use this to cause a denial of service (system crash).
    (CVE-2020-12114)

    It was discovered that the USB susbsystem's scatter-gather
    implementation in the Linux kernel did not properly take data
    references in some situations, leading to a use-after-free. A
    physically proximate attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12464)

    Bui Quang Minh discovered that the XDP socket implementation in
    the Linux kernel did not properly validate meta-data passed from
    user space, leading to an out-of-bounds write vulnerability. A
    local attacker with the CAP_NET_ADMIN capability could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-12659)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1023-aws - 5.3.0-1023.25
    linux-image-5.3.0-1023-kvm - 5.3.0-1023.25
    linux-image-5.3.0-1024-oracle - 5.3.0-1024.26
    linux-image-5.3.0-1026-gcp - 5.3.0-1026.28
    linux-image-5.3.0-1028-azure - 5.3.0-1028.29
    linux-image-5.3.0-59-generic - 5.3.0-59.53
    linux-image-5.3.0-59-generic-lpae - 5.3.0-59.53
    linux-image-5.3.0-59-lowlatency - 5.3.0-59.53
    linux-image-5.3.0-59-snapdragon - 5.3.0-59.53
    linux-image-aws - 5.3.0.1023.34
    linux-image-azure - 5.3.0.1028.47
    linux-image-gcp - 5.3.0.1026.37
    linux-image-generic - 5.3.0.59.49
    linux-image-generic-lpae - 5.3.0.59.49
    linux-image-gke - 5.3.0.1026.37
    linux-image-kvm - 5.3.0.1023.21
    linux-image-lowlatency - 5.3.0.59.49
    linux-image-oracle - 5.3.0.1024.40
    linux-image-snapdragon - 5.3.0.59.49
    linux-image-virtual - 5.3.0.59.49

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1023-aws - 5.3.0-1023.25~18.04.1
    linux-image-5.3.0-1024-oracle - 5.3.0-1024.26~18.04.1
    linux-image-5.3.0-1026-gcp - 5.3.0-1026.28~18.04.1
    linux-image-5.3.0-1026-gke - 5.3.0-1026.28~18.04.1
    linux-image-5.3.0-1028-azure - 5.3.0-1028.29~18.04.1
    linux-image-5.3.0-59-generic - 5.3.0-59.53~18.04.1
    linux-image-5.3.0-59-generic-lpae - 5.3.0-59.53~18.04.1
    linux-image-5.3.0-59-lowlatency - 5.3.0-59.53~18.04.1
    linux-image-aws - 5.3.0.1023.23
    linux-image-azure - 5.3.0.1028.25
    linux-image-gcp - 5.3.0.1026.21
    linux-image-generic-hwe-18.04 - 5.3.0.59.113
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.59.113
    linux-image-gke-5.3 - 5.3.0.1026.13
    linux-image-gkeop-5.3 - 5.3.0.59.113
    linux-image-lowlatency-hwe-18.04 - 5.3.0.59.113
    linux-image-oracle - 5.3.0.1024.22
    linux-image-snapdragon-hwe-18.04 - 5.3.0.59.113
    linux-image-virtual-hwe-18.04 - 5.3.0.59.113

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    Please note that the mitigation for CVE-2020-0543 requires a
    processor microcode update to be applied, either from your system
    manufacturer or via the intel-microcode package. The kernel update
    for this issue provides the ability to disable the mitigation and
    to report vulnerability status.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-0067
    * CVE-2020-0543
    * CVE-2020-12114
    * CVE-2020-12464
    * CVE-2020-12659
    * https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Thursday, June 25, 2020 20:10:08
    linux kernel vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the NVIDIA graphics driver
    kernel modules.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-aws-5.3 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure-5.3 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oem - Linux kernel for OEM systems
    * linux-oem-osp1 - Linux kernel for OEM systems
    * linux-oracle-5.3 - Linux kernel for Oracle Cloud systems

    Details

    USN-4404-1 fixed vulnerabilities in the NVIDIA graphics drivers.
    This update provides the corresponding updates for the NVIDIA
    Linux DKMS kernel modules.

    Original advisory details:

    Thomas E. Carroll discovered that the NVIDIA Cuda grpahics driver
    did not properly perform access control when performing IPC. An
    attacker could use this to cause a denial of service or possibly
    execute arbitrary code. (CVE-2020-5963)

    It was discovered that the UVM driver in the NVIDIA graphics
    driver contained a race condition. A local attacker could use this
    to cause a denial of service. (CVE-2020-5967)

    It was discovered that the NVIDIA virtual GPU guest drivers
    contained an unspecified vulnerability that could potentially lead
    to privileged operation execution. An attacker could use this to
    cause a denial of service. (CVE-2020-5973)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1017-aws - 5.4.0-1017.17
    linux-image-5.4.0-1018-gcp - 5.4.0-1018.18
    linux-image-5.4.0-1018-oracle - 5.4.0-1018.18
    linux-image-5.4.0-1019-azure - 5.4.0-1019.19
    linux-image-5.4.0-39-generic - 5.4.0-39.43
    linux-image-5.4.0-39-generic-lpae - 5.4.0-39.43
    linux-image-5.4.0-39-lowlatency - 5.4.0-39.43
    linux-image-aws - 5.4.0.1017.18
    linux-image-azure - 5.4.0.1019.18
    linux-image-gcp - 5.4.0.1018.16
    linux-image-generic - 5.4.0.39.42
    linux-image-generic-hwe-20.04 - 5.4.0.39.42
    linux-image-generic-lpae - 5.4.0.39.42
    linux-image-generic-lpae-hwe-20.04 - 5.4.0.39.42
    linux-image-gke - 5.4.0.1018.16
    linux-image-lowlatency - 5.4.0.39.42
    linux-image-lowlatency-hwe-20.04 - 5.4.0.39.42
    linux-image-oem - 5.4.0.39.42
    linux-image-oem-osp1 - 5.4.0.39.42
    linux-image-oracle - 5.4.0.1018.16
    linux-image-virtual - 5.4.0.39.42
    linux-image-virtual-hwe-20.04 - 5.4.0.39.42

    Ubuntu 19.10
    linux-image-5.3.0-1027-oracle - 5.3.0-1027.29
    linux-image-5.3.0-1028-aws - 5.3.0-1028.30
    linux-image-5.3.0-1029-gcp - 5.3.0-1029.31
    linux-image-5.3.0-61-generic - 5.3.0-61.55
    linux-image-5.3.0-61-generic-lpae - 5.3.0-61.55
    linux-image-5.3.0-61-lowlatency - 5.3.0-61.55
    linux-image-5.3.0-61-snapdragon - 5.3.0-61.55
    linux-image-aws - 5.3.0.1028.38
    linux-image-gcp - 5.3.0.1029.39
    linux-image-generic - 5.3.0.61.51
    linux-image-generic-lpae - 5.3.0.61.51
    linux-image-gke - 5.3.0.1029.39
    linux-image-lowlatency - 5.3.0.61.51
    linux-image-oracle - 5.3.0.1027.42
    linux-image-snapdragon - 5.3.0.61.51
    linux-image-virtual - 5.3.0.61.51

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1047-oracle - 4.15.0-1047.51
    linux-image-4.15.0-1076-aws - 4.15.0-1076.80
    linux-image-4.15.0-108-generic - 4.15.0-108.109
    linux-image-4.15.0-108-generic-lpae - 4.15.0-108.109
    linux-image-4.15.0-108-lowlatency - 4.15.0-108.109
    linux-image-4.15.0-1090-oem - 4.15.0-1090.100
    linux-image-5.0.0-1062-oem-osp1 - 5.0.0-1062.67
    linux-image-5.3.0-1027-oracle - 5.3.0-1027.29~18.04.1
    linux-image-5.3.0-1028-aws - 5.3.0-1028.30~18.04.1
    linux-image-5.3.0-1029-gcp - 5.3.0-1029.31~18.04.1
    linux-image-5.3.0-1031-azure - 5.3.0-1031.32~18.04.1
    linux-image-5.3.0-61-generic - 5.3.0-61.55~18.04.1
    linux-image-5.3.0-61-generic-lpae - 5.3.0-61.55~18.04.1
    linux-image-5.3.0-61-lowlatency - 5.3.0-61.55~18.04.1
    linux-image-aws - 5.3.0.1028.26
    linux-image-aws-lts-18.04 - 4.15.0.1076.78
    linux-image-azure - 5.3.0.1031.27
    linux-image-gcp - 5.3.0.1029.23
    linux-image-generic - 4.15.0.108.96
    linux-image-generic-hwe-18.04 - 5.3.0.61.114
    linux-image-generic-lpae - 4.15.0.108.96
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.61.114
    linux-image-gkeop-5.3 - 5.3.0.61.114
    linux-image-lowlatency - 4.15.0.108.96
    linux-image-lowlatency-hwe-18.04 - 5.3.0.61.114
    linux-image-oem - 4.15.0.1090.93
    linux-image-oem-osp1 - 5.0.0.1062.60
    linux-image-oracle - 5.3.0.1027.24
    linux-image-oracle-edge - 5.3.0.1027.24
    linux-image-oracle-lts-18.04 - 4.15.0.1047.56
    linux-image-powerpc-e500mc - 4.15.0.108.96
    linux-image-powerpc-smp - 4.15.0.108.96
    linux-image-powerpc64-emb - 4.15.0.108.96
    linux-image-powerpc64-smp - 4.15.0.108.96
    linux-image-snapdragon-hwe-18.04 - 5.3.0.61.114
    linux-image-virtual - 4.15.0.108.96
    linux-image-virtual-hwe-18.04 - 5.3.0.61.114

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * USN-4404-1
    * CVE-2020-5963
    * CVE-2020-5967
    * CVE-2020-5973

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Friday, July 03, 2020 00:10:01
    linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15,
    linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle,
    linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that the network block device (nbd)
    implementation in the Linux kernel did not properly check for
    error conditions in some situations. An attacker could possibly
    use this to cause a denial of service (system crash).
    (CVE-2019-16089)

    It was discovered that the btrfs file system implementation in the
    Linux kernel did not properly validate file system metadata in
    some situations. An attacker could use this to construct a
    malicious btrfs image that, when mounted, could cause a denial of
    service (system crash). (CVE-2019-19036, CVE-2019-19318,
    CVE-2019-19813, CVE-2019-19816)

    It was discovered that the btrfs implementation in the Linux
    kernel did not properly detect that a block was marked dirty in
    some situations. An attacker could use this to specially craft a
    file system image that, when unmounted, could cause a denial of
    service (system crash). (CVE-2019-19377)

    It was discovered that the kernel->user space relay implementation
    in the Linux kernel did not properly check return values in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19462)

    Matthew Sheets discovered that the SELinux network label handling
    implementation in the Linux kernel could be coerced into
    de-referencing a NULL pointer. A remote attacker could use this to
    cause a denial of service (system crash). (CVE-2020-10711)

    It was discovered that the SCSI generic (sg) driver in the Linux
    kernel did not properly handle certain error conditions correctly.
    A local privileged attacker could use this to cause a denial of
    service (system crash). (CVE-2020-12770)

    It was discovered that the USB Gadget device driver in the Linux
    kernel did not validate arguments passed from configfs in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash) or possibly expose sensitive
    information. (CVE-2020-13143)

    It was discovered that the efi subsystem in the Linux kernel did
    not handle memory allocation failures during early boot in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-12380)

    It was discovered that the btrfs file system in the Linux kernel
    in some error conditions could report register information to the
    dmesg buffer. A local attacker could possibly use this to expose
    sensitive information. (CVE-2019-19039)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1048-oracle - 4.15.0-1048.52
    linux-image-4.15.0-1064-gke - 4.15.0-1064.67
    linux-image-4.15.0-1065-raspi2 - 4.15.0-1065.69
    linux-image-4.15.0-1069-kvm - 4.15.0-1069.70
    linux-image-4.15.0-1077-aws - 4.15.0-1077.81
    linux-image-4.15.0-1078-gcp - 4.15.0-1078.88
    linux-image-4.15.0-1081-snapdragon - 4.15.0-1081.88
    linux-image-4.15.0-109-generic - 4.15.0-109.110
    linux-image-4.15.0-109-generic-lpae - 4.15.0-109.110
    linux-image-4.15.0-109-lowlatency - 4.15.0-109.110
    linux-image-4.15.0-1091-oem - 4.15.0-1091.101
    linux-image-aws-lts-18.04 - 4.15.0.1077.79
    linux-image-gcp-lts-18.04 - 4.15.0.1078.94
    linux-image-generic - 4.15.0.109.97
    linux-image-generic-lpae - 4.15.0.109.97
    linux-image-gke - 4.15.0.1064.66
    linux-image-gke-4.15 - 4.15.0.1064.66
    linux-image-kvm - 4.15.0.1069.65
    linux-image-lowlatency - 4.15.0.109.97
    linux-image-oem - 4.15.0.1091.94
    linux-image-oracle-lts-18.04 - 4.15.0.1048.57
    linux-image-powerpc-e500mc - 4.15.0.109.97
    linux-image-powerpc-smp - 4.15.0.109.97
    linux-image-powerpc64-emb - 4.15.0.109.97
    linux-image-powerpc64-smp - 4.15.0.109.97
    linux-image-raspi2 - 4.15.0.1065.63
    linux-image-snapdragon - 4.15.0.1081.84
    linux-image-virtual - 4.15.0.109.97

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1046-oracle - 4.15.0-1046.50~16.04.1
    linux-image-4.15.0-107-generic - 4.15.0-107.108~16.04.1
    linux-image-4.15.0-107-generic-lpae -
    4.15.0-107.108~16.04.1
    linux-image-4.15.0-107-lowlatency - 4.15.0-107.108~16.04.1
    linux-image-4.15.0-1074-aws - 4.15.0-1074.78~16.04.1
    linux-image-4.15.0-1078-gcp - 4.15.0-1078.88~16.04.1
    linux-image-aws-hwe - 4.15.0.1074.74
    linux-image-gcp - 4.15.0.1078.80
    linux-image-generic-hwe-16.04 - 4.15.0.107.112
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.107.112
    linux-image-gke - 4.15.0.1078.80
    linux-image-lowlatency-hwe-16.04 - 4.15.0.107.112
    linux-image-oem - 4.15.0.107.112
    linux-image-oracle - 4.15.0.1046.39
    linux-image-virtual-hwe-16.04 - 4.15.0.107.112

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-12380
    * CVE-2019-16089
    * CVE-2019-19036
    * CVE-2019-19039
    * CVE-2019-19318
    * CVE-2019-19377
    * CVE-2019-19462
    * CVE-2019-19813
    * CVE-2019-19816
    * CVE-2020-10711
    * CVE-2020-12770
    * CVE-2020-13143

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Friday, July 03, 2020 00:10:01
    linux-gke-5.0, linux-oem-osp1 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM systems

    Details

    Matthew Sheets discovered that the SELinux network label handling
    implementation in the Linux kernel could be coerced into
    de-referencing a NULL pointer. A remote attacker could use this to
    cause a denial of service (system crash). (CVE-2020-10711)

    It was discovered that the SCSI generic (sg) driver in the Linux
    kernel did not properly handle certain error conditions correctly.
    A local privileged attacker could use this to cause a denial of
    service (system crash). (CVE-2020-12770)

    It was discovered that the USB Gadget device driver in the Linux
    kernel did not validate arguments passed from configfs in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash) or possibly expose sensitive
    information. (CVE-2020-13143)

    Dmitry Vyukov discovered that the SELinux netlink security hook in
    the Linux kernel did not validate messages in some situations. A
    privileged attacker could use this to bypass SELinux netlink
    restrictions. (CVE-2020-10751)

    It was discovered that the KVM implementation in the Linux kernel
    did not properly deallocate memory on initialization for some
    processors. A local attacker could possibly use this to cause a
    denial of service. (CVE-2020-12768)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1043-gke - 5.0.0-1043.44
    linux-image-5.0.0-1063-oem-osp1 - 5.0.0-1063.68
    linux-image-gke-5.0 - 5.0.0.1043.28
    linux-image-oem-osp1 - 5.0.0.1063.61

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-10711
    * CVE-2020-10751
    * CVE-2020-12768
    * CVE-2020-12770
    * CVE-2020-13143

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Friday, July 03, 2020 00:10:01
    linux, linux-azure, linux-gcp, linux-gcp-5.3, linux-hwe, linux-kvm, linux-oracle, linux-oracle-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 19.10
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-gcp-5.3 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oracle-5.3 - Linux kernel for Oracle Cloud systems

    Details

    Matthew Sheets discovered that the SELinux network label handling
    implementation in the Linux kernel could be coerced into
    de-referencing a NULL pointer. A remote attacker could use this to
    cause a denial of service (system crash). (CVE-2020-10711)

    It was discovered that the SCSI generic (sg) driver in the Linux
    kernel did not properly handle certain error conditions correctly.
    A local privileged attacker could use this to cause a denial of
    service (system crash). (CVE-2020-12770)

    It was discovered that the USB Gadget device driver in the Linux
    kernel did not validate arguments passed from configfs in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash) or possibly expose sensitive
    information. (CVE-2020-13143)

    Dmitry Vyukov discovered that the SELinux netlink security hook in
    the Linux kernel did not validate messages in some situations. A
    privileged attacker could use this to bypass SELinux netlink
    restrictions. (CVE-2020-10751)

    It was discovered that the KVM implementation in the Linux kernel
    did not properly deallocate memory on initialization for some
    processors. A local attacker could possibly use this to cause a
    denial of service. (CVE-2020-12768)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 19.10
    linux-image-5.3.0-1024-kvm - 5.3.0-1024.26
    linux-image-5.3.0-1028-oracle - 5.3.0-1028.30
    linux-image-5.3.0-1030-gcp - 5.3.0-1030.32
    linux-image-5.3.0-1031-azure - 5.3.0-1031.32
    linux-image-5.3.0-62-generic - 5.3.0-62.56
    linux-image-5.3.0-62-generic-lpae - 5.3.0-62.56
    linux-image-5.3.0-62-lowlatency - 5.3.0-62.56
    linux-image-5.3.0-62-snapdragon - 5.3.0-62.56
    linux-image-azure - 5.3.0.1031.49
    linux-image-gcp - 5.3.0.1030.40
    linux-image-generic - 5.3.0.62.52
    linux-image-generic-lpae - 5.3.0.62.52
    linux-image-gke - 5.3.0.1030.40
    linux-image-kvm - 5.3.0.1024.22
    linux-image-lowlatency - 5.3.0.62.52
    linux-image-oracle - 5.3.0.1028.43
    linux-image-snapdragon - 5.3.0.62.52
    linux-image-virtual - 5.3.0.62.52

    Ubuntu 18.04 LTS
    linux-image-5.3.0-1028-oracle - 5.3.0-1028.30~18.04.1
    linux-image-5.3.0-1030-gcp - 5.3.0-1030.32~18.04.1
    linux-image-5.3.0-62-generic - 5.3.0-62.56~18.04.1
    linux-image-5.3.0-62-generic-lpae - 5.3.0-62.56~18.04.1
    linux-image-5.3.0-62-lowlatency - 5.3.0-62.56~18.04.1
    linux-image-gcp - 5.3.0.1030.24
    linux-image-generic-hwe-18.04 - 5.3.0.62.115
    linux-image-generic-lpae-hwe-18.04 - 5.3.0.62.115
    linux-image-gkeop-5.3 - 5.3.0.62.115
    linux-image-lowlatency-hwe-18.04 - 5.3.0.62.115
    linux-image-oracle - 5.3.0.1028.25
    linux-image-snapdragon-hwe-18.04 - 5.3.0.62.115
    linux-image-virtual-hwe-18.04 - 5.3.0.62.115

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-10711
    * CVE-2020-10751
    * CVE-2020-12768
    * CVE-2020-12770
    * CVE-2020-13143

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Friday, July 03, 2020 00:10:01
    linux, linux-aws, linux-gcp, linux-kvm, linux-oracle, linux-riscv, vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-riscv - Linux kernel for RISC-V systems

    Details

    It was discovered that the elf handling code in the Linux kernel
    did not initialize memory before using it in certain situations. A
    local attacker could use this to possibly expose sensitive
    information (kernel memory). (CVE-2020-10732)

    Matthew Sheets discovered that the SELinux network label handling
    implementation in the Linux kernel could be coerced into
    de-referencing a NULL pointer. A remote attacker could use this to
    cause a denial of service (system crash). (CVE-2020-10711)

    It was discovered that the SCSI generic (sg) driver in the Linux
    kernel did not properly handle certain error conditions correctly.
    A local privileged attacker could use this to cause a denial of
    service (system crash). (CVE-2020-12770)

    It was discovered that the USB Gadget device driver in the Linux
    kernel did not validate arguments passed from configfs in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash) or possibly expose sensitive
    information. (CVE-2020-13143)

    It was discovered that the KVM implementation in the Linux kernel
    did not properly deallocate memory on initialization for some
    processors. A local attacker could possibly use this to cause a
    denial of service. (CVE-2020-12768)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1018-aws - 5.4.0-1018.18
    linux-image-5.4.0-1019-gcp - 5.4.0-1019.19
    linux-image-5.4.0-1019-oracle - 5.4.0-1019.19
    linux-image-5.4.0-28-generic - 5.4.0-28.32
    linux-image-5.4.0-40-generic - 5.4.0-40.44
    linux-image-5.4.0-40-generic-lpae - 5.4.0-40.44
    linux-image-5.4.0-40-lowlatency - 5.4.0-40.44
    linux-image-aws - 5.4.0.1018.19
    linux-image-gcp - 5.4.0.1019.17
    linux-image-generic - 5.4.0.28.35
    linux-image-generic-lpae - 5.4.0.40.43
    linux-image-gke - 5.4.0.1019.17
    linux-image-kvm - 5.4.0.1018.17
    linux-image-lowlatency - 5.4.0.40.43
    linux-image-oem - 5.4.0.40.43
    linux-image-oem-osp1 - 5.4.0.40.43
    linux-image-oracle - 5.4.0.1019.17
    linux-image-virtual - 5.4.0.28.35

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-10711
    * CVE-2020-10732
    * CVE-2020-12768
    * CVE-2020-12770
    * CVE-2020-13143

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Monday, July 06, 2020 20:10:01
    linux, linux-lts-xenial, linux-aws, linux-kvm, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that a race condition existed in the Precision
    Time Protocol (PTP) implementation in the Linux kernel, leading to
    a use-after- free vulnerability. A local attacker could possibly
    use this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2020-10690)

    Matthew Sheets discovered that the SELinux network label handling
    implementation in the Linux kernel could be coerced into
    de-referencing a NULL pointer. A remote attacker could use this to
    cause a denial of service (system crash). (CVE-2020-10711)

    It was discovered that the SCSI generic (sg) driver in the Linux
    kernel did not properly handle certain error conditions correctly.
    A local privileged attacker could use this to cause a denial of
    service (system crash). (CVE-2020-12770)

    It was discovered that the USB Gadget device driver in the Linux
    kernel did not validate arguments passed from configfs in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash) or possibly expose sensitive
    information. (CVE-2020-13143)

    Shijie Luo discovered that the ext4 file system implementation in
    the Linux kernel did not properly check for a too-large journal
    size. An attacker could use this to construct a malicious ext4
    image that, when mounted, could cause a denial of service (soft
    lockup). (CVE-2020-8992)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1076-kvm - 4.4.0-1076.83
    linux-image-4.4.0-1110-aws - 4.4.0-1110.121
    linux-image-4.4.0-1135-raspi2 - 4.4.0-1135.144
    linux-image-4.4.0-1139-snapdragon - 4.4.0-1139.147
    linux-image-4.4.0-185-generic - 4.4.0-185.215
    linux-image-4.4.0-185-generic-lpae - 4.4.0-185.215
    linux-image-4.4.0-185-lowlatency - 4.4.0-185.215
    linux-image-4.4.0-185-powerpc-e500mc - 4.4.0-185.215
    linux-image-4.4.0-185-powerpc-smp - 4.4.0-185.215
    linux-image-4.4.0-185-powerpc64-emb - 4.4.0-185.215
    linux-image-4.4.0-185-powerpc64-smp - 4.4.0-185.215
    linux-image-aws - 4.4.0.1110.114
    linux-image-generic - 4.4.0.185.191
    linux-image-generic-lpae - 4.4.0.185.191
    linux-image-kvm - 4.4.0.1076.74
    linux-image-lowlatency - 4.4.0.185.191
    linux-image-powerpc-e500mc - 4.4.0.185.191
    linux-image-powerpc-smp - 4.4.0.185.191
    linux-image-powerpc64-emb - 4.4.0.185.191
    linux-image-powerpc64-smp - 4.4.0.185.191
    linux-image-raspi2 - 4.4.0.1135.135
    linux-image-snapdragon - 4.4.0.1139.131
    linux-image-virtual - 4.4.0.185.191

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1074-aws - 4.4.0-1074.78
    linux-image-4.4.0-185-generic - 4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-generic-lpae - 4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-lowlatency - 4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-powerpc-e500mc -
    4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-powerpc-smp - 4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-powerpc64-emb -
    4.4.0-185.215~14.04.1
    linux-image-4.4.0-185-powerpc64-smp -
    4.4.0-185.215~14.04.1
    linux-image-aws - 4.4.0.1074.71
    linux-image-generic-lpae-lts-xenial - 4.4.0.185.162
    linux-image-generic-lts-xenial - 4.4.0.185.162
    linux-image-lowlatency-lts-xenial - 4.4.0.185.162
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.185.162
    linux-image-powerpc-smp-lts-xenial - 4.4.0.185.162
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.185.162
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.185.162
    linux-image-virtual-lts-xenial - 4.4.0.185.162

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-10690
    * CVE-2020-10711
    * CVE-2020-12770
    * CVE-2020-13143
    * CVE-2020-8992

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 22, 2020 04:10:01
    linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that the Kvaser CAN/USB driver in the Linux
    kernel did not properly initialize memory in certain situations. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-19947)

    Chuhong Yuan discovered that go7007 USB audio device driver in the
    Linux kernel did not properly deallocate memory in some failure
    conditions. A physically proximate attacker could use this to
    cause a denial of service (memory exhaustion). (CVE-2019-20810)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading SSDT code from an
    EFI variable. A privileged attacker could use this to bypass
    Secure Boot lockdown restrictions and execute arbitrary code in
    the kernel. (CVE-2019-20908)

    It was discovered that the elf handling code in the Linux kernel
    did not initialize memory before using it in certain situations. A
    local attacker could use this to possibly expose sensitive
    information (kernel memory). (CVE-2020-10732)

    It was discovered that the Linux kernel did not correctly apply
    Speculative Store Bypass Disable (SSBD) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10766)

    It was discovered that the Linux kernel did not correctly apply
    Indirect Branch Predictor Barrier (IBPB) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10767)

    It was discovered that the Linux kernel could incorrectly enable
    indirect branch speculation after it has been disabled for a
    process via a prctl() call. A local attacker could possibly use
    this to expose sensitive information. (CVE-2020-10768)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    It was discovered that the Virtual Terminal keyboard driver in the
    Linux kernel contained an integer overflow. A local attacker could
    possibly use this to have a unspecified impact. (CVE-2020-13974)

    It was discovered that the efi subsystem in the Linux kernel did
    not handle memory allocation failures during early boot in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-12380)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1077-kvm - 4.4.0-1077.84
    linux-image-4.4.0-1111-aws - 4.4.0-1111.123
    linux-image-4.4.0-1136-raspi2 - 4.4.0-1136.145
    linux-image-4.4.0-1140-snapdragon - 4.4.0-1140.148
    linux-image-4.4.0-186-generic - 4.4.0-186.216
    linux-image-4.4.0-186-generic-lpae - 4.4.0-186.216
    linux-image-4.4.0-186-lowlatency - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc-e500mc - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc-smp - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc64-emb - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc64-smp - 4.4.0-186.216
    linux-image-aws - 4.4.0.1111.116
    linux-image-generic - 4.4.0.186.192
    linux-image-generic-lpae - 4.4.0.186.192
    linux-image-kvm - 4.4.0.1077.75
    linux-image-lowlatency - 4.4.0.186.192
    linux-image-powerpc-e500mc - 4.4.0.186.192
    linux-image-powerpc-smp - 4.4.0.186.192
    linux-image-powerpc64-emb - 4.4.0.186.192
    linux-image-powerpc64-smp - 4.4.0.186.192
    linux-image-raspi2 - 4.4.0.1136.136
    linux-image-snapdragon - 4.4.0.1140.132
    linux-image-virtual - 4.4.0.186.192

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1075-aws - 4.4.0-1075.79
    linux-image-4.4.0-186-generic - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-generic-lpae - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-lowlatency - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc-e500mc -
    4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc-smp - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc64-emb -
    4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc64-smp -
    4.4.0-186.216~14.04.1
    linux-image-aws - 4.4.0.1075.72
    linux-image-generic-lpae-lts-xenial - 4.4.0.186.163
    linux-image-generic-lts-xenial - 4.4.0.186.163
    linux-image-lowlatency-lts-xenial - 4.4.0.186.163
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.186.163
    linux-image-powerpc-smp-lts-xenial - 4.4.0.186.163
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.186.163
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.186.163
    linux-image-virtual-lts-xenial - 4.4.0.186.163

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-12380
    * CVE-2019-19947
    * CVE-2019-20810
    * CVE-2019-20908
    * CVE-2020-10732
    * CVE-2020-10766
    * CVE-2020-10767
    * CVE-2020-10768
    * CVE-2020-11935
    * CVE-2020-13974

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 22, 2020 04:10:01
    linux, linux-aws, linux-aws-hwe, linux-gcp, linux-gcp-4.15,
    linux-gke-4.15, linux-kvm, linux-oem, linux-oracle, linux-raspi2 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems

    Details

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading SSDT code from an
    EFI variable. A privileged attacker could use this to bypass
    Secure Boot lockdown restrictions and execute arbitrary code in
    the kernel. (CVE-2019-20908)

    Fan Yang discovered that the mremap implementation in the Linux
    kernel did not properly handle DAX Huge Pages. A local attacker
    with access to DAX storage could use this to gain administrative
    privileges. (CVE-2020-10757)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading ACPI tables via
    configfs. A privileged attacker could use this to bypass Secure
    Boot lockdown restrictions and execute arbitrary code in the
    kernel. (CVE-2020-15780)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1050-oracle - 4.15.0-1050.54
    linux-image-4.15.0-1066-gke - 4.15.0-1066.69
    linux-image-4.15.0-1067-raspi2 - 4.15.0-1067.71
    linux-image-4.15.0-1071-kvm - 4.15.0-1071.72
    linux-image-4.15.0-1079-aws - 4.15.0-1079.83
    linux-image-4.15.0-1080-gcp - 4.15.0-1080.90
    linux-image-4.15.0-1093-oem - 4.15.0-1093.103
    linux-image-4.15.0-112-generic - 4.15.0-112.113
    linux-image-4.15.0-112-generic-lpae - 4.15.0-112.113
    linux-image-4.15.0-112-lowlatency - 4.15.0-112.113
    linux-image-aws-lts-18.04 - 4.15.0.1079.81
    linux-image-gcp-lts-18.04 - 4.15.0.1080.96
    linux-image-generic - 4.15.0.112.100
    linux-image-generic-lpae - 4.15.0.112.100
    linux-image-gke - 4.15.0.1066.68
    linux-image-gke-4.15 - 4.15.0.1066.68
    linux-image-kvm - 4.15.0.1071.67
    linux-image-lowlatency - 4.15.0.112.100
    linux-image-oem - 4.15.0.1093.96
    linux-image-oracle-lts-18.04 - 4.15.0.1050.59
    linux-image-powerpc-e500mc - 4.15.0.112.100
    linux-image-powerpc-smp - 4.15.0.112.100
    linux-image-powerpc64-emb - 4.15.0.112.100
    linux-image-powerpc64-smp - 4.15.0.112.100
    linux-image-raspi2 - 4.15.0.1067.65
    linux-image-virtual - 4.15.0.112.100

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1050-oracle - 4.15.0-1050.54~16.04.1
    linux-image-4.15.0-1079-aws - 4.15.0-1079.83~16.04.1
    linux-image-4.15.0-1080-gcp - 4.15.0-1080.90~16.04.1
    linux-image-aws-hwe - 4.15.0.1079.76
    linux-image-gcp - 4.15.0.1080.82
    linux-image-gke - 4.15.0.1080.82
    linux-image-oracle - 4.15.0.1050.41

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-20908
    * CVE-2020-10757
    * CVE-2020-11935
    * CVE-2020-15780

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 22, 2020 04:10:01
    linux, linux-aws, linux-gcp, linux-hwe-5.4, linux-kvm, linux-oracle, linux-raspi-5.4, linux-riscv vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-riscv - Linux kernel for RISC-V systems
    * linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
    * linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems

    Details

    It was discovered that the network block device (nbd)
    implementation in the Linux kernel did not properly check for
    error conditions in some situations. An attacker could possibly
    use this to cause a denial of service (system crash).
    (CVE-2019-16089)

    It was discovered that the kernel->user space relay implementation
    in the Linux kernel did not properly check return values in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19462)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading ACPI tables via
    configfs. A privileged attacker could use this to bypass Secure
    Boot lockdown restrictions and execute arbitrary code in the
    kernel. (CVE-2020-15780)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1020-aws - 5.4.0-1020.20
    linux-image-5.4.0-1021-gcp - 5.4.0-1021.21
    linux-image-5.4.0-1021-oracle - 5.4.0-1021.21
    linux-image-5.4.0-30-generic - 5.4.0-30.34
    linux-image-5.4.0-42-generic - 5.4.0-42.46
    linux-image-5.4.0-42-generic-lpae - 5.4.0-42.46
    linux-image-5.4.0-42-lowlatency - 5.4.0-42.46
    linux-image-aws - 5.4.0.1020.21
    linux-image-gcp - 5.4.0.1021.19
    linux-image-generic - 5.4.0.30.37
    linux-image-generic-lpae - 5.4.0.42.45
    linux-image-gke - 5.4.0.1021.19
    linux-image-kvm - 5.4.0.1020.19
    linux-image-lowlatency - 5.4.0.42.45
    linux-image-oem - 5.4.0.42.45
    linux-image-oem-osp1 - 5.4.0.42.45
    linux-image-oracle - 5.4.0.1021.19
    linux-image-virtual - 5.4.0.30.37

    Ubuntu 18.04 LTS
    linux-image-5.4.0-1015-raspi - 5.4.0-1015.15~18.04.1
    linux-image-5.4.0-42-generic - 5.4.0-42.46~18.04.1
    linux-image-5.4.0-42-generic-lpae - 5.4.0-42.46~18.04.1
    linux-image-5.4.0-42-lowlatency - 5.4.0-42.46~18.04.1
    linux-image-generic-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-generic-lpae-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-gkeop-5.4 - 5.4.0.42.46~18.04.35
    linux-image-lowlatency-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-raspi-hwe-18.04 - 5.4.0.1015.19
    linux-image-snapdragon-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-virtual-hwe-18.04 - 5.4.0.42.46~18.04.35

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-16089
    * CVE-2019-19462
    * CVE-2020-11935
    * CVE-2020-15780

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Monday, July 27, 2020 20:10:05
    linux-gke-5.0, linux-oem-osp1 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-oem-osp1 - Linux kernel for OEM systems

    Details

    It was discovered that the network block device (nbd)
    implementation in the Linux kernel did not properly check for
    error conditions in some situations. An attacker could possibly
    use this to cause a denial of service (system crash).
    (CVE-2019-16089)

    It was discovered that the btrfs file system implementation in the
    Linux kernel did not properly validate file system metadata in
    some situations. An attacker could use this to construct a
    malicious btrfs image that, when mounted, could cause a denial of
    service (system crash). (CVE-2019-19036)

    It was discovered that the kernel->user space relay implementation
    in the Linux kernel did not properly check return values in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19462)

    Chuhong Yuan discovered that go7007 USB audio device driver in the
    Linux kernel did not properly deallocate memory in some failure
    conditions. A physically proximate attacker could use this to
    cause a denial of service (memory exhaustion). (CVE-2019-20810)

    It was discovered that the elf handling code in the Linux kernel
    did not initialize memory before using it in certain situations. A
    local attacker could use this to possibly expose sensitive
    information (kernel memory). (CVE-2020-10732)

    Fan Yang discovered that the mremap implementation in the Linux
    kernel did not properly handle DAX Huge Pages. A local attacker
    with access to DAX storage could use this to gain administrative
    privileges. (CVE-2020-10757)

    It was discovered that the Linux kernel did not correctly apply
    Speculative Store Bypass Disable (SSBD) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10766)

    It was discovered that the Linux kernel did not correctly apply
    Indirect Branch Predictor Barrier (IBPB) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10767)

    It was discovered that the Linux kernel could incorrectly enable
    indirect branch speculation after it has been disabled for a
    process via a prctl() call. A local attacker could possibly use
    this to expose sensitive information. (CVE-2020-10768)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    It was discovered that the Virtual Terminal keyboard driver in the
    Linux kernel contained an integer overflow. A local attacker could
    possibly use this to have an unspecified impact. (CVE-2020-13974)

    It was discovered that the efi subsystem in the Linux kernel did
    not handle memory allocation failures during early boot in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-12380)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading SSDT code from an
    EFI variable. A privileged attacker could use this to bypass
    Secure Boot lockdown restrictions and execute arbitrary code in
    the kernel. (CVE-2019-20908)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading ACPI tables via
    configfs. A privileged attacker could use this to bypass Secure
    Boot lockdown restrictions and execute arbitrary code in the
    kernel. (CVE-2020-15780)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1045-gke - 5.0.0-1045.46
    linux-image-5.0.0-1065-oem-osp1 - 5.0.0-1065.70
    linux-image-gke-5.0 - 5.0.0.1045.30
    linux-image-oem-osp1 - 5.0.0.1065.63

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-12380
    * CVE-2019-16089
    * CVE-2019-19036
    * CVE-2019-19462
    * CVE-2019-20810
    * CVE-2019-20908
    * CVE-2020-10732
    * CVE-2020-10757
    * CVE-2020-10766
    * CVE-2020-10767
    * CVE-2020-10768
    * CVE-2020-11935
    * CVE-2020-13974
    * CVE-2020-15780

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 29, 2020 00:10:05
    linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that the Kvaser CAN/USB driver in the Linux
    kernel did not properly initialize memory in certain situations. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-19947)

    Chuhong Yuan discovered that go7007 USB audio device driver in the
    Linux kernel did not properly deallocate memory in some failure
    conditions. A physically proximate attacker could use this to
    cause a denial of service (memory exhaustion). (CVE-2019-20810)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading SSDT code from an
    EFI variable. A privileged attacker could use this to bypass
    Secure Boot lockdown restrictions and execute arbitrary code in
    the kernel. (CVE-2019-20908)

    It was discovered that the elf handling code in the Linux kernel
    did not initialize memory before using it in certain situations. A
    local attacker could use this to possibly expose sensitive
    information (kernel memory). (CVE-2020-10732)

    It was discovered that the Linux kernel did not correctly apply
    Speculative Store Bypass Disable (SSBD) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10766)

    It was discovered that the Linux kernel did not correctly apply
    Indirect Branch Predictor Barrier (IBPB) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10767)

    It was discovered that the Linux kernel could incorrectly enable
    indirect branch speculation after it has been disabled for a
    process via a prctl() call. A local attacker could possibly use
    this to expose sensitive information. (CVE-2020-10768)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    It was discovered that the Virtual Terminal keyboard driver in the
    Linux kernel contained an integer overflow. A local attacker could
    possibly use this to have an unspecified impact. (CVE-2020-13974)

    It was discovered that the efi subsystem in the Linux kernel did
    not handle memory allocation failures during early boot in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-12380)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1077-kvm - 4.4.0-1077.84
    linux-image-4.4.0-1111-aws - 4.4.0-1111.123
    linux-image-4.4.0-1136-raspi2 - 4.4.0-1136.145
    linux-image-4.4.0-1140-snapdragon - 4.4.0-1140.148
    linux-image-4.4.0-186-generic - 4.4.0-186.216
    linux-image-4.4.0-186-generic-lpae - 4.4.0-186.216
    linux-image-4.4.0-186-lowlatency - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc-e500mc - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc-smp - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc64-emb - 4.4.0-186.216
    linux-image-4.4.0-186-powerpc64-smp - 4.4.0-186.216
    linux-image-aws - 4.4.0.1111.116
    linux-image-generic - 4.4.0.186.192
    linux-image-generic-lpae - 4.4.0.186.192
    linux-image-kvm - 4.4.0.1077.75
    linux-image-lowlatency - 4.4.0.186.192
    linux-image-powerpc-e500mc - 4.4.0.186.192
    linux-image-powerpc-smp - 4.4.0.186.192
    linux-image-powerpc64-emb - 4.4.0.186.192
    linux-image-powerpc64-smp - 4.4.0.186.192
    linux-image-raspi2 - 4.4.0.1136.136
    linux-image-snapdragon - 4.4.0.1140.132
    linux-image-virtual - 4.4.0.186.192

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1075-aws - 4.4.0-1075.79
    linux-image-4.4.0-186-generic - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-generic-lpae - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-lowlatency - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc-e500mc -
    4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc-smp - 4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc64-emb -
    4.4.0-186.216~14.04.1
    linux-image-4.4.0-186-powerpc64-smp -
    4.4.0-186.216~14.04.1
    linux-image-aws - 4.4.0.1075.72
    linux-image-generic-lpae-lts-xenial - 4.4.0.186.163
    linux-image-generic-lts-xenial - 4.4.0.186.163
    linux-image-lowlatency-lts-xenial - 4.4.0.186.163
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.186.163
    linux-image-powerpc-smp-lts-xenial - 4.4.0.186.163
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.186.163
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.186.163
    linux-image-virtual-lts-xenial - 4.4.0.186.163

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-12380
    * CVE-2019-19947
    * CVE-2019-20810
    * CVE-2019-20908
    * CVE-2020-10732
    * CVE-2020-10766
    * CVE-2020-10767
    * CVE-2020-10768
    * CVE-2020-11935
    * CVE-2020-13974

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 29, 2020 00:10:05
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
    linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-kvm,
    linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading SSDT code from an
    EFI variable. A privileged attacker could use this to bypass
    Secure Boot lockdown restrictions and execute arbitrary code in
    the kernel. (CVE-2019-20908)

    Fan Yang discovered that the mremap implementation in the Linux
    kernel did not properly handle DAX Huge Pages. A local attacker
    with access to DAX storage could use this to gain administrative
    privileges. (CVE-2020-10757)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading ACPI tables via
    configfs. A privileged attacker could use this to bypass Secure
    Boot lockdown restrictions and execute arbitrary code in the
    kernel. (CVE-2020-15780)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1050-oracle - 4.15.0-1050.54
    linux-image-4.15.0-1066-gke - 4.15.0-1066.69
    linux-image-4.15.0-1067-raspi2 - 4.15.0-1067.71
    linux-image-4.15.0-1071-kvm - 4.15.0-1071.72
    linux-image-4.15.0-1079-aws - 4.15.0-1079.83
    linux-image-4.15.0-1080-gcp - 4.15.0-1080.90
    linux-image-4.15.0-1083-snapdragon - 4.15.0-1083.91
    linux-image-4.15.0-1092-azure - 4.15.0-1092.102
    linux-image-4.15.0-1093-oem - 4.15.0-1093.103
    linux-image-4.15.0-112-generic - 4.15.0-112.113
    linux-image-4.15.0-112-generic-lpae - 4.15.0-112.113
    linux-image-4.15.0-112-lowlatency - 4.15.0-112.113
    linux-image-aws-lts-18.04 - 4.15.0.1079.81
    linux-image-azure-lts-18.04 - 4.15.0.1092.63
    linux-image-gcp-lts-18.04 - 4.15.0.1080.96
    linux-image-generic - 4.15.0.112.100
    linux-image-generic-lpae - 4.15.0.112.100
    linux-image-gke - 4.15.0.1066.68
    linux-image-gke-4.15 - 4.15.0.1066.68
    linux-image-kvm - 4.15.0.1071.67
    linux-image-lowlatency - 4.15.0.112.100
    linux-image-oem - 4.15.0.1093.96
    linux-image-oracle-lts-18.04 - 4.15.0.1050.59
    linux-image-powerpc-e500mc - 4.15.0.112.100
    linux-image-powerpc-smp - 4.15.0.112.100
    linux-image-powerpc64-emb - 4.15.0.112.100
    linux-image-powerpc64-smp - 4.15.0.112.100
    linux-image-raspi2 - 4.15.0.1067.65
    linux-image-snapdragon - 4.15.0.1083.86
    linux-image-virtual - 4.15.0.112.100

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1050-oracle - 4.15.0-1050.54~16.04.1
    linux-image-4.15.0-1079-aws - 4.15.0-1079.83~16.04.1
    linux-image-4.15.0-1080-gcp - 4.15.0-1080.90~16.04.1
    linux-image-4.15.0-1092-azure - 4.15.0-1092.102~16.04.1
    linux-image-4.15.0-112-generic - 4.15.0-112.113~16.04.1
    linux-image-4.15.0-112-generic-lpae -
    4.15.0-112.113~16.04.1
    linux-image-4.15.0-112-lowlatency - 4.15.0-112.113~16.04.1
    linux-image-aws-hwe - 4.15.0.1079.76
    linux-image-azure - 4.15.0.1092.87
    linux-image-gcp - 4.15.0.1080.82
    linux-image-generic-hwe-16.04 - 4.15.0.112.114
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.112.114
    linux-image-gke - 4.15.0.1080.82
    linux-image-lowlatency-hwe-16.04 - 4.15.0.112.114
    linux-image-oem - 4.15.0.112.114
    linux-image-oracle - 4.15.0.1050.41
    linux-image-virtual-hwe-16.04 - 4.15.0.112.114

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-20908
    * CVE-2020-10757
    * CVE-2020-11935
    * CVE-2020-15780

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, July 29, 2020 00:10:05
    linux, linux-aws, linux-azure, linux-azure-5.4, linux-gcp,
    linux-hwe-5.4, linux-kvm, linux-oracle, linux-raspi, linux-raspi-5.4, linux-riscv vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi - Linux kernel for Raspberry Pi (V8) systems
    * linux-riscv - Linux kernel for RISC-V systems
    * linux-azure-5.4 - linux kernel for microsoft azure cloud
    systems
    * linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
    * linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems

    Details

    It was discovered that the network block device (nbd)
    implementation in the Linux kernel did not properly check for
    error conditions in some situations. An attacker could possibly
    use this to cause a denial of service (system crash).
    (CVE-2019-16089)

    It was discovered that the kernel->user space relay implementation
    in the Linux kernel did not properly check return values in some
    situations. A local attacker could possibly use this to cause a
    denial of service (system crash). (CVE-2019-19462)

    Mauricio Faria de Oliveira discovered that the aufs implementation
    in the Linux kernel improperly managed inode reference counts in
    the vfsub_dentry_open() method. A local attacker could use this
    vulnerability to cause a denial of service. (CVE-2020-11935)

    Jason A. Donenfeld discovered that the ACPI implementation in the
    Linux kernel did not properly restrict loading ACPI tables via
    configfs. A privileged attacker could use this to bypass Secure
    Boot lockdown restrictions and execute arbitrary code in the
    kernel. (CVE-2020-15780)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1015-raspi - 5.4.0-1015.15
    linux-image-5.4.0-1020-aws - 5.4.0-1020.20
    linux-image-5.4.0-1021-gcp - 5.4.0-1021.21
    linux-image-5.4.0-1021-oracle - 5.4.0-1021.21
    linux-image-5.4.0-1022-azure - 5.4.0-1022.22
    linux-image-5.4.0-30-generic - 5.4.0-30.34
    linux-image-5.4.0-42-generic - 5.4.0-42.46
    linux-image-5.4.0-42-generic-lpae - 5.4.0-42.46
    linux-image-5.4.0-42-lowlatency - 5.4.0-42.46
    linux-image-aws - 5.4.0.1020.21
    linux-image-azure - 5.4.0.1022.21
    linux-image-gcp - 5.4.0.1021.19
    linux-image-generic - 5.4.0.30.37
    linux-image-generic-lpae - 5.4.0.42.45
    linux-image-gke - 5.4.0.1021.19
    linux-image-kvm - 5.4.0.1020.19
    linux-image-lowlatency - 5.4.0.42.45
    linux-image-oem - 5.4.0.42.45
    linux-image-oem-osp1 - 5.4.0.42.45
    linux-image-oracle - 5.4.0.1021.19
    linux-image-raspi - 5.4.0.1015.50
    linux-image-raspi2 - 5.4.0.1015.50
    linux-image-virtual - 5.4.0.30.37

    Ubuntu 18.04 LTS
    linux-image-5.4.0-1015-raspi - 5.4.0-1015.15~18.04.1
    linux-image-5.4.0-1022-azure - 5.4.0-1022.22~18.04.1
    linux-image-5.4.0-42-generic - 5.4.0-42.46~18.04.1
    linux-image-5.4.0-42-generic-lpae - 5.4.0-42.46~18.04.1
    linux-image-5.4.0-42-lowlatency - 5.4.0-42.46~18.04.1
    linux-image-azure-edge - 5.4.0.1022.6
    linux-image-generic-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-generic-lpae-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-gkeop-5.4 - 5.4.0.42.46~18.04.35
    linux-image-lowlatency-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-raspi-hwe-18.04 - 5.4.0.1015.19
    linux-image-snapdragon-hwe-18.04 - 5.4.0.42.46~18.04.35
    linux-image-virtual-hwe-18.04 - 5.4.0.42.46~18.04.35

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-16089
    * CVE-2019-19462
    * CVE-2020-11935
    * CVE-2020-15780

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, August 18, 2020 04:10:03
    linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi (V7) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that the bcache subsystem in the Linux kernel
    did not properly release a lock in some error conditions. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2020-12771)

    Kyungtae Kim discovered that the USB testing driver in the Linux
    kernel did not properly deallocate memory on disconnect events. A
    physically proximate attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2020-15393)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1078-kvm - 4.4.0-1078.85
    linux-image-4.4.0-1112-aws - 4.4.0-1112.124
    linux-image-4.4.0-1137-raspi2 - 4.4.0-1137.146
    linux-image-4.4.0-1141-snapdragon - 4.4.0-1141.149
    linux-image-4.4.0-187-generic - 4.4.0-187.217
    linux-image-4.4.0-187-generic-lpae - 4.4.0-187.217
    linux-image-4.4.0-187-lowlatency - 4.4.0-187.217
    linux-image-4.4.0-187-powerpc-e500mc - 4.4.0-187.217
    linux-image-4.4.0-187-powerpc-smp - 4.4.0-187.217
    linux-image-4.4.0-187-powerpc64-emb - 4.4.0-187.217
    linux-image-4.4.0-187-powerpc64-smp - 4.4.0-187.217
    linux-image-aws - 4.4.0.1112.117
    linux-image-generic - 4.4.0.187.193
    linux-image-generic-lpae - 4.4.0.187.193
    linux-image-kvm - 4.4.0.1078.76
    linux-image-lowlatency - 4.4.0.187.193
    linux-image-powerpc-e500mc - 4.4.0.187.193
    linux-image-powerpc-smp - 4.4.0.187.193
    linux-image-powerpc64-emb - 4.4.0.187.193
    linux-image-powerpc64-smp - 4.4.0.187.193
    linux-image-raspi2 - 4.4.0.1137.137
    linux-image-snapdragon - 4.4.0.1141.133
    linux-image-virtual - 4.4.0.187.193

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1076-aws - 4.4.0-1076.80
    linux-image-4.4.0-187-generic - 4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-generic-lpae - 4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-lowlatency - 4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-powerpc-e500mc -
    4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-powerpc-smp - 4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-powerpc64-emb -
    4.4.0-187.217~14.04.1
    linux-image-4.4.0-187-powerpc64-smp -
    4.4.0-187.217~14.04.1
    linux-image-aws - 4.4.0.1076.73
    linux-image-generic-lpae-lts-xenial - 4.4.0.187.164
    linux-image-generic-lts-xenial - 4.4.0.187.164
    linux-image-lowlatency-lts-xenial - 4.4.0.187.164
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.187.164
    linux-image-powerpc-smp-lts-xenial - 4.4.0.187.164
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.187.164
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.187.164
    linux-image-virtual-lts-xenial - 4.4.0.187.164

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-12771
    * CVE-2020-15393

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, September 02, 2020 04:10:03
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
    linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-kvm, linux-oem,
    linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems

    Details

    Timothy Michaud discovered that the i915 graphics driver in the
    Linux kernel did not properly validate user memory locations for
    the i915_gem_execbuffer2_ioctl. A local attacker could possibly
    use this to cause a denial of service or execute arbitrary code.
    (CVE-2018-20669)

    It was discovered that the Kvaser CAN/USB driver in the Linux
    kernel did not properly initialize memory in certain situations. A
    local attacker could possibly use this to expose sensitive
    information (kernel memory). (CVE-2019-19947)

    Chuhong Yuan discovered that go7007 USB audio device driver in the
    Linux kernel did not properly deallocate memory in some failure
    conditions. A physically proximate attacker could use this to
    cause a denial of service (memory exhaustion). (CVE-2019-20810)

    It was discovered that the elf handling code in the Linux kernel
    did not initialize memory before using it in certain situations. A
    local attacker could use this to possibly expose sensitive
    information (kernel memory). (CVE-2020-10732)

    It was discovered that the Linux kernel did not correctly apply
    Speculative Store Bypass Disable (SSBD) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10766)

    It was discovered that the Linux kernel did not correctly apply
    Indirect Branch Predictor Barrier (IBPB) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10767)

    It was discovered that the Linux kernel could incorrectly enable
    Indirect Branch Speculation after it has been disabled for a
    process via a prctl() call. A local attacker could possibly use
    this to expose sensitive information. (CVE-2020-10768)

    Luca Bruno discovered that the zram module in the Linux kernel did
    not properly restrict unprivileged users from accessing the
    hot_add sysfs file. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2020-10781)

    It was discovered that the XFS file system implementation in the
    Linux kernel did not properly validate meta data in some
    circumstances. An attacker could use this to construct a malicious
    XFS image that, when mounted, could cause a denial of service.
    (CVE-2020-12655)

    It was discovered that the bcache subsystem in the Linux kernel
    did not properly release a lock in some error conditions. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2020-12771)

    It was discovered that the Virtual Terminal keyboard driver in the
    Linux kernel contained an integer overflow. A local attacker could
    possibly use this to have an unspecified impact. (CVE-2020-13974)

    Kyungtae Kim discovered that the USB testing driver in the Linux
    kernel did not properly deallocate memory on disconnect events. A
    physically proximate attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2020-15393)

    It was discovered that the NFS server implementation in the Linux
    kernel did not properly honor umask settings when setting
    permissions while creating file system objects if the underlying
    file system did not support ACLs. An attacker could possibly use
    this to expose sensitive information or violate system integrity.
    (CVE-2020-24394)

    It was discovered that the Kerberos SUNRPC GSS implementation in
    the Linux kernel did not properly deallocate memory on module
    unload. A local privileged attacker could possibly use this to
    cause a denial of service (memory exhaustion). (CVE-2020-12656)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1051-oracle - 4.15.0-1051.55
    linux-image-4.15.0-1067-gke - 4.15.0-1067.70
    linux-image-4.15.0-1068-raspi2 - 4.15.0-1068.72
    linux-image-4.15.0-1072-kvm - 4.15.0-1072.73
    linux-image-4.15.0-1080-aws - 4.15.0-1080.84
    linux-image-4.15.0-1081-gcp - 4.15.0-1081.92
    linux-image-4.15.0-1084-snapdragon - 4.15.0-1084.92
    linux-image-4.15.0-1093-azure - 4.15.0-1093.103
    linux-image-4.15.0-1094-oem - 4.15.0-1094.104
    linux-image-4.15.0-115-generic - 4.15.0-115.116
    linux-image-4.15.0-115-generic-lpae - 4.15.0-115.116
    linux-image-4.15.0-115-lowlatency - 4.15.0-115.116
    linux-image-aws-lts-18.04 - 4.15.0.1080.82
    linux-image-azure-lts-18.04 - 4.15.0.1093.67
    linux-image-gcp-lts-18.04 - 4.15.0.1081.99
    linux-image-generic - 4.15.0.115.103
    linux-image-generic-lpae - 4.15.0.115.103
    linux-image-gke - 4.15.0.1067.71
    linux-image-gke-4.15 - 4.15.0.1067.71
    linux-image-kvm - 4.15.0.1072.68
    linux-image-lowlatency - 4.15.0.115.103
    linux-image-oem - 4.15.0.1094.98
    linux-image-oracle-lts-18.04 - 4.15.0.1051.62
    linux-image-powerpc-e500mc - 4.15.0.115.103
    linux-image-powerpc-smp - 4.15.0.115.103
    linux-image-powerpc64-emb - 4.15.0.115.103
    linux-image-powerpc64-smp - 4.15.0.115.103
    linux-image-raspi2 - 4.15.0.1068.66
    linux-image-snapdragon - 4.15.0.1084.87
    linux-image-virtual - 4.15.0.115.103

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1051-oracle - 4.15.0-1051.55~16.04.1
    linux-image-4.15.0-1080-aws - 4.15.0-1080.84~16.04.1
    linux-image-4.15.0-1081-gcp - 4.15.0-1081.92~16.04.1
    linux-image-4.15.0-1093-azure - 4.15.0-1093.103~16.04.1
    linux-image-aws-hwe - 4.15.0.1080.77
    linux-image-azure - 4.15.0.1093.88
    linux-image-azure-edge - 4.15.0.1093.88
    linux-image-gcp - 4.15.0.1081.83
    linux-image-gke - 4.15.0.1081.83
    linux-image-oracle - 4.15.0.1051.42

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1093-azure - 4.15.0-1093.103~14.04.1
    linux-image-azure - 4.15.0.1093.70

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2018-20669
    * CVE-2019-19947
    * CVE-2019-20810
    * CVE-2020-10732
    * CVE-2020-10766
    * CVE-2020-10767
    * CVE-2020-10768
    * CVE-2020-10781
    * CVE-2020-12655
    * CVE-2020-12656
    * CVE-2020-12771
    * CVE-2020-13974
    * CVE-2020-15393
    * CVE-2020-24394

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Wednesday, September 02, 2020 04:10:03
    linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4,
    linux-gcp, linux-gcp-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi - Linux kernel for Raspberry Pi (V8) systems
    * linux-aws-5.4 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure-5.4 - Linux kernel for Microsoft Azure cloud
    systems
    * linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-oracle-5.4 - Linux kernel for Oracle Cloud systems
    * linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems

    Details

    Chuhong Yuan discovered that go7007 USB audio device driver in the
    Linux kernel did not properly deallocate memory in some failure
    conditions. A physically proximate attacker could use this to
    cause a denial of service (memory exhaustion). (CVE-2019-20810)

    Fan Yang discovered that the mremap implementation in the Linux
    kernel did not properly handle DAX Huge Pages. A local attacker
    with access to DAX storage could use this to gain administrative
    privileges. (CVE-2020-10757)

    It was discovered that the Linux kernel did not correctly apply
    Speculative Store Bypass Disable (SSBD) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10766)

    It was discovered that the Linux kernel did not correctly apply
    Indirect Branch Predictor Barrier (IBPB) mitigations in certain
    situations. A local attacker could possibly use this to expose
    sensitive information. (CVE-2020-10767)

    It was discovered that the Linux kernel could incorrectly enable
    Indirect Branch Speculation after it has been disabled for a
    process via a prctl() call. A local attacker could possibly use
    this to expose sensitive information. (CVE-2020-10768)

    Luca Bruno discovered that the zram module in the Linux kernel did
    not properly restrict unprivileged users from accessing the
    hot_add sysfs file. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2020-10781)

    It was discovered that the XFS file system implementation in the
    Linux kernel did not properly validate meta data in some
    circumstances. An attacker could use this to construct a malicious
    XFS image that, when mounted, could cause a denial of service.
    (CVE-2020-12655)

    It was discovered that the bcache subsystem in the Linux kernel
    did not properly release a lock in some error conditions. A local
    attacker could possibly use this to cause a denial of service.
    (CVE-2020-12771)

    It was discovered that the Virtual Terminal keyboard driver in the
    Linux kernel contained an integer overflow. A local attacker could
    possibly use this to have an unspecified impact. (CVE-2020-13974)

    It was discovered that the cgroup v2 subsystem in the Linux kernel
    did not properly perform reference counting in some situations,
    leading to a NULL pointer dereference. A local attacker could use
    this to cause a denial of service or possibly gain administrative
    privileges. (CVE-2020-14356)

    Kyungtae Kim discovered that the USB testing driver in the Linux
    kernel did not properly deallocate memory on disconnect events. A
    physically proximate attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2020-15393)

    It was discovered that the NFS server implementation in the Linux
    kernel did not properly honor umask settings when setting
    permissions while creating file system objects if the underlying
    file system did not support ACLs. An attacker could possibly use
    this to expose sensitive information or violate system integrity.
    (CVE-2020-24394)

    It was discovered that the Kerberos SUNRPC GSS implementation in
    the Linux kernel did not properly deallocate memory on module
    unload. A local privileged attacker could possibly use this to
    cause a denial of service (memory exhaustion). (CVE-2020-12656)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1016-raspi - 5.4.0-1016.17
    linux-image-5.4.0-1022-aws - 5.4.0-1022.22
    linux-image-5.4.0-1022-gcp - 5.4.0-1022.22
    linux-image-5.4.0-1022-oracle - 5.4.0-1022.22
    linux-image-5.4.0-1023-azure - 5.4.0-1023.23
    linux-image-5.4.0-45-generic - 5.4.0-45.49
    linux-image-5.4.0-45-generic-lpae - 5.4.0-45.49
    linux-image-5.4.0-45-lowlatency - 5.4.0-45.49
    linux-image-aws - 5.4.0.1022.23
    linux-image-azure - 5.4.0.1023.22
    linux-image-gcp - 5.4.0.1022.20
    linux-image-generic - 5.4.0.45.49
    linux-image-generic-lpae - 5.4.0.45.49
    linux-image-gke - 5.4.0.1022.20
    linux-image-kvm - 5.4.0.1021.20
    linux-image-lowlatency - 5.4.0.45.49
    linux-image-oem - 5.4.0.45.49
    linux-image-oem-osp1 - 5.4.0.45.49
    linux-image-oracle - 5.4.0.1022.20
    linux-image-raspi - 5.4.0.1016.51
    linux-image-raspi2 - 5.4.0.1016.51
    linux-image-virtual - 5.4.0.45.49

    Ubuntu 18.04 LTS
    linux-image-5.4.0-1016-raspi - 5.4.0-1016.17~18.04.1
    linux-image-5.4.0-1022-aws - 5.4.0-1022.22~18.04.1
    linux-image-5.4.0-1022-gcp - 5.4.0-1022.22~18.04.1
    linux-image-5.4.0-1022-oracle - 5.4.0-1022.22~18.04.1
    linux-image-5.4.0-1023-azure - 5.4.0-1023.23~18.04.1
    linux-image-aws-edge - 5.4.0.1022.8
    linux-image-azure - 5.4.0.1023.7
    linux-image-gcp - 5.4.0.1022.9
    linux-image-gke-5.4 - 5.4.0.1022.9
    linux-image-oracle - 5.4.0.1022.7
    linux-image-raspi-hwe-18.04 - 5.4.0.1016.20

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-20810
    * CVE-2020-10757
    * CVE-2020-10766
    * CVE-2020-10767
    * CVE-2020-10768
    * CVE-2020-10781
    * CVE-2020-12655
    * CVE-2020-12656
    * CVE-2020-12771
    * CVE-2020-13974
    * CVE-2020-14356
    * CVE-2020-15393
    * CVE-2020-24394

    --- Mystic BBS v1.12 A45 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, September 22, 2020 00:10:03
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
    linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-oem,
    linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    It was discovered that the AMD Cryptographic Coprocessor device
    driver in the Linux kernel did not properly deallocate memory in
    some situations. A local attacker could use this to cause a denial
    of service (memory exhaustion). (CVE-2019-18808)

    It was discovered that the Conexant 23885 TV card device driver
    for the Linux kernel did not properly deallocate memory in some
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19054)

    It was discovered that the ADIS16400 IIO IMU Driver for the Linux
    kernel did not properly deallocate memory in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19061)

    It was discovered that the AMD Audio Coprocessor driver for the
    Linux kernel did not properly deallocate memory in certain error
    conditions. A local attacker with the ability to load modules
    could use this to cause a denial of service (memory exhaustion).
    (CVE-2019-19067)

    It was discovered that the Atheros HTC based wireless driver in
    the Linux kernel did not properly deallocate in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19073, CVE-2019-19074)

    It was discovered that the F2FS file system in the Linux kernel
    did not properly perform bounds checking in some situations,
    leading to an out-of- bounds read. A local attacker could possibly
    use this to expose sensitive information (kernel memory).
    (CVE-2019-9445)

    It was discovered that the VFIO PCI driver in the Linux kernel did
    not properly handle attempts to access disabled memory spaces. A
    local attacker could use this to cause a denial of service (system
    crash). (CVE-2020-12888)

    It was discovered that the cgroup v2 subsystem in the Linux kernel
    did not properly perform reference counting in some situations,
    leading to a NULL pointer dereference. A local attacker could use
    this to cause a denial of service or possibly gain administrative
    privileges. (CVE-2020-14356)

    It was discovered that the state of network RNG in the Linux
    kernel was potentially observable. A remote attacker could use
    this to expose sensitive information. (CVE-2020-16166)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1054-oracle - 4.15.0-1054.58
    linux-image-4.15.0-1070-gke - 4.15.0-1070.73
    linux-image-4.15.0-1071-raspi2 - 4.15.0-1071.75
    linux-image-4.15.0-1083-aws - 4.15.0-1083.87
    linux-image-4.15.0-1084-gcp - 4.15.0-1084.95
    linux-image-4.15.0-1087-snapdragon - 4.15.0-1087.95
    linux-image-4.15.0-1096-azure - 4.15.0-1096.106
    linux-image-4.15.0-1097-oem - 4.15.0-1097.107
    linux-image-4.15.0-118-generic - 4.15.0-118.119
    linux-image-4.15.0-118-generic-lpae - 4.15.0-118.119
    linux-image-4.15.0-118-lowlatency - 4.15.0-118.119
    linux-image-aws-lts-18.04 - 4.15.0.1083.85
    linux-image-azure-lts-18.04 - 4.15.0.1096.69
    linux-image-gcp-lts-18.04 - 4.15.0.1084.102
    linux-image-generic - 4.15.0.118.105
    linux-image-generic-lpae - 4.15.0.118.105
    linux-image-gke - 4.15.0.1070.74
    linux-image-gke-4.15 - 4.15.0.1070.74
    linux-image-lowlatency - 4.15.0.118.105
    linux-image-oem - 4.15.0.1097.101
    linux-image-oracle-lts-18.04 - 4.15.0.1054.64
    linux-image-powerpc-e500mc - 4.15.0.118.105
    linux-image-powerpc-smp - 4.15.0.118.105
    linux-image-powerpc64-emb - 4.15.0.118.105
    linux-image-powerpc64-smp - 4.15.0.118.105
    linux-image-raspi2 - 4.15.0.1071.68
    linux-image-snapdragon - 4.15.0.1087.90
    linux-image-virtual - 4.15.0.118.105

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1054-oracle - 4.15.0-1054.58~16.04.1
    linux-image-4.15.0-1083-aws - 4.15.0-1083.87~16.04.1
    linux-image-4.15.0-1084-gcp - 4.15.0-1084.95~16.04.1
    linux-image-4.15.0-1096-azure - 4.15.0-1096.106~16.04.1
    linux-image-4.15.0-118-generic - 4.15.0-118.119~16.04.1
    linux-image-4.15.0-118-generic-lpae -
    4.15.0-118.119~16.04.1
    linux-image-4.15.0-118-lowlatency - 4.15.0-118.119~16.04.1
    linux-image-aws-hwe - 4.15.0.1083.79
    linux-image-azure - 4.15.0.1096.90
    linux-image-azure-edge - 4.15.0.1096.90
    linux-image-gcp - 4.15.0.1084.85
    linux-image-generic-hwe-16.04 - 4.15.0.118.119
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.118.119
    linux-image-gke - 4.15.0.1084.85
    linux-image-lowlatency-hwe-16.04 - 4.15.0.118.119
    linux-image-oem - 4.15.0.118.119
    linux-image-oracle - 4.15.0.1054.44
    linux-image-virtual-hwe-16.04 - 4.15.0.118.119

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1096-azure - 4.15.0-1096.106~14.04.1
    linux-image-azure - 4.15.0.1096.72

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-18808
    * CVE-2019-19054
    * CVE-2019-19061
    * CVE-2019-19067
    * CVE-2019-19073
    * CVE-2019-19074
    * CVE-2019-9445
    * CVE-2020-12888
    * CVE-2020-14356
    * CVE-2020-16166

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, September 22, 2020 00:10:03
    linux, linux-aws, linux-lts-xenial, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    It was discovered that the Conexant 23885 TV card device driver
    for the Linux kernel did not properly deallocate memory in some
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19054)

    It was discovered that the Atheros HTC based wireless driver in
    the Linux kernel did not properly deallocate in certain error
    conditions. A local attacker could use this to cause a denial of
    service (memory exhaustion). (CVE-2019-19073, CVE-2019-19074)

    Yue Haibing discovered that the Linux kernel did not properly
    handle reference counting in sysfs for network devices in some
    situations. A local attacker could possibly use this to cause a
    denial of service. (CVE-2019-20811)

    It was discovered that the F2FS file system in the Linux kernel
    did not properly perform bounds checking in some situations,
    leading to an out-of- bounds read. A local attacker could possibly
    use this to expose sensitive information (kernel memory).
    (CVE-2019-9445)

    It was discovered that the F2FS file system in the Linux kernel
    did not properly validate xattr meta data in some situations,
    leading to an out-of- bounds read. An attacker could use this to
    construct a malicious F2FS image that, when mounted, could expose
    sensitive information (kernel memory). (CVE-2019-9453)

    It was discovered that the F2FS file system implementation in the
    Linux kernel did not properly perform bounds checking on xattrs in
    some situations. A local attacker could possibly use this to
    expose sensitive information (kernel memory). (CVE-2020-0067)

    It was discovered that the NFS client implementation in the Linux
    kernel did not properly perform bounds checking before copying
    security labels in some situations. A local attacker could use
    this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2020-25212)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1114-aws - 4.4.0-1114.127
    linux-image-4.4.0-1139-raspi2 - 4.4.0-1139.148
    linux-image-4.4.0-1143-snapdragon - 4.4.0-1143.152
    linux-image-4.4.0-190-generic - 4.4.0-190.220
    linux-image-4.4.0-190-generic-lpae - 4.4.0-190.220
    linux-image-4.4.0-190-lowlatency - 4.4.0-190.220
    linux-image-4.4.0-190-powerpc-e500mc - 4.4.0-190.220
    linux-image-4.4.0-190-powerpc-smp - 4.4.0-190.220
    linux-image-4.4.0-190-powerpc64-emb - 4.4.0-190.220
    linux-image-4.4.0-190-powerpc64-smp - 4.4.0-190.220
    linux-image-aws - 4.4.0.1114.119
    linux-image-generic - 4.4.0.190.196
    linux-image-generic-lpae - 4.4.0.190.196
    linux-image-lowlatency - 4.4.0.190.196
    linux-image-powerpc-e500mc - 4.4.0.190.196
    linux-image-powerpc-smp - 4.4.0.190.196
    linux-image-powerpc64-emb - 4.4.0.190.196
    linux-image-powerpc64-smp - 4.4.0.190.196
    linux-image-raspi2 - 4.4.0.1139.139
    linux-image-snapdragon - 4.4.0.1143.135
    linux-image-virtual - 4.4.0.190.196

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1078-aws - 4.4.0-1078.82
    linux-image-4.4.0-190-generic - 4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-generic-lpae - 4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-lowlatency - 4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-powerpc-e500mc -
    4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-powerpc-smp - 4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-powerpc64-emb -
    4.4.0-190.220~14.04.1
    linux-image-4.4.0-190-powerpc64-smp -
    4.4.0-190.220~14.04.1
    linux-image-aws - 4.4.0.1078.75
    linux-image-generic-lpae-lts-xenial - 4.4.0.190.166
    linux-image-generic-lts-xenial - 4.4.0.190.166
    linux-image-lowlatency-lts-xenial - 4.4.0.190.166
    linux-image-powerpc-e500mc-lts-xenial - 4.4.0.190.166
    linux-image-powerpc-smp-lts-xenial - 4.4.0.190.166
    linux-image-powerpc64-emb-lts-xenial - 4.4.0.190.166
    linux-image-powerpc64-smp-lts-xenial - 4.4.0.190.166
    linux-image-virtual-lts-xenial - 4.4.0.190.166

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-19054
    * CVE-2019-19073
    * CVE-2019-19074
    * CVE-2019-20811
    * CVE-2019-9445
    * CVE-2019-9453
    * CVE-2020-0067
    * CVE-2020-25212

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From bugz_ubuntu@21:4/110 to Ubuntu Users on Tuesday, September 22, 2020 00:10:03
    linux, linux-azure, linux-gcp, linux-oracle vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-oracle - Linux kernel for Oracle Cloud systems

    Details

    It was discovered that the AMD Cryptographic Coprocessor device
    driver in the Linux kernel did not properly deallocate memory in
    some situations. A local attacker could use this to cause a denial
    of service (memory exhaustion). (CVE-2019-18808)

    It was discovered that the Conexant 23885 TV card device driver
    for the Linux kernel did not properly deallocate memory in some
    error conditions. A local attacker could use this to cause a
    denial of service (memory exhaustion). (CVE-2019-19054)

    It was discovered that the VFIO PCI driver in the Linux kernel did
    not properly handle attempts to access disabled memory spaces. A
    local attacker could use this to cause a denial of service (system
    crash). (CVE-2020-12888)

    It was discovered that the state of network RNG in the Linux
    kernel was potentially observable. A remote attacker could use
    this to expose sensitive information. (CVE-2020-16166)

    It was discovered that the NFS client implementation in the Linux
    kernel did not properly perform bounds checking before copying
    security labels in some situations. A local attacker could use
    this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2020-25212)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1025-gcp - 5.4.0-1025.25
    linux-image-5.4.0-1025-oracle - 5.4.0-1025.25
    linux-image-5.4.0-1026-azure - 5.4.0-1026.26
    linux-image-5.4.0-48-generic - 5.4.0-48.52
    linux-image-5.4.0-48-generic-lpae - 5.4.0-48.52
    linux-image-5.4.0-48-lowlatency - 5.4.0-48.52
    linux-image-azure - 5.4.0.1026.25
    linux-image-gcp - 5.4.0.1025.22
    linux-image-generic - 5.4.0.48.51
    linux-image-generic-lpae - 5.4.0.48.51
    linux-image-gke - 5.4.0.1025.22
    linux-image-lowlatency - 5.4.0.48.51
    linux-image-oem - 5.4.0.48.51
    linux-image-oem-osp1 - 5.4.0.48.51
    linux-image-oracle - 5.4.0.1025.22
    linux-image-virtual - 5.4.0.48.51

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2019-18808
    * CVE-2019-19054
    * CVE-2020-12888
    * CVE-2020-16166
    * CVE-2020-25212

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Wednesday, October 14, 2020 00:10:04
    linux-hwe, linux-gke-5.0, linux-gke-5.3, linux-oem-osp1,
    linux-raspi2-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-gke-5.3 - Linux kernel for Google Container Engine (GKE)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel
    * linux-oem-osp1 - Linux kernel for OEM systems
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi (V8) systems

    Details

    Hador Manor discovered that the DCCP protocol implementation in
    the Linux kernel improperly handled socket reuse, leading to a
    use-after-free vulnerability. A local attacker could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-16119)

    Giuseppe Scrivano discovered that the overlay file system in the
    Linux kernel did not properly perform permission checks in some
    situations. A local attacker could possibly use this to bypass
    intended restrictions and gain read access to restricted files.
    (CVE-2020-16120)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1049-gke - 5.0.0-1049.50
    linux-image-5.0.0-1069-oem-osp1 - 5.0.0-1069.75
    linux-image-5.3.0-1035-raspi2 - 5.3.0-1035.37
    linux-image-5.3.0-1038-gke - 5.3.0-1038.40
    linux-image-5.3.0-68-generic - 5.3.0-68.63
    linux-image-5.3.0-68-lowlatency - 5.3.0-68.63
    linux-image-gke-5.0 - 5.0.0.1049.33
    linux-image-gke-5.3 - 5.3.0.1038.21
    linux-image-gkeop-5.3 - 5.3.0.68.125
    linux-image-oem-osp1 - 5.0.0.1069.67
    linux-image-raspi2-hwe-18.04 - 5.3.0.1035.24

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-16119
    * CVE-2020-16120

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Wednesday, October 14, 2020 00:10:04
    linux, linux-aws, linux-kvm, linux-lts-xenial, linux-raspi2,
    linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-lts-xenial - Linux hardware enablement kernel from
    Xenial for Trusty

    Details

    Hador Manor discovered that the DCCP protocol implementation in
    the Linux kernel improperly handled socket reuse, leading to a
    use-after-free vulnerability. A local attacker could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-16119)

    Wen Xu discovered that the XFS file system in the Linux kernel did
    not properly validate inode metadata in some situations. An
    attacker could use this to construct a malicious XFS image that,
    when mounted, could cause a denial of service (system crash).
    (CVE-2018-10322)

    Jay Shin discovered that the ext4 file system implementation in
    the Linux kernel did not properly handle directory access with
    broken indexing, leading to an out-of-bounds read vulnerability. A
    local attacker could use this to cause a denial of service (system
    crash). (CVE-2020-14314)

    It was discovered that a race condition existed in the hugetlb
    sysctl implementation in the Linux kernel. A privileged attacker
    could use this to cause a denial of service (system crash).
    (CVE-2020-25285)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 16.04 LTS
    linux-image-4.4.0-1082-kvm - 4.4.0-1082.91
    linux-image-4.4.0-1117-aws - 4.4.0-1117.131
    linux-image-4.4.0-1141-raspi2 - 4.4.0-1141.151
    linux-image-4.4.0-1145-snapdragon - 4.4.0-1145.155
    linux-image-4.4.0-193-generic - 4.4.0-193.224
    linux-image-4.4.0-193-generic-lpae - 4.4.0-193.224
    linux-image-4.4.0-193-lowlatency - 4.4.0-193.224
    linux-image-4.4.0-193-powerpc-e500mc - 4.4.0-193.224
    linux-image-4.4.0-193-powerpc-smp - 4.4.0-193.224
    linux-image-4.4.0-193-powerpc64-emb - 4.4.0-193.224
    linux-image-4.4.0-193-powerpc64-smp - 4.4.0-193.224
    linux-image-aws - 4.4.0.1117.122
    linux-image-generic - 4.4.0.193.199
    linux-image-generic-lpae - 4.4.0.193.199
    linux-image-kvm - 4.4.0.1082.80
    linux-image-lowlatency - 4.4.0.193.199
    linux-image-powerpc-e500mc - 4.4.0.193.199
    linux-image-powerpc-smp - 4.4.0.193.199
    linux-image-powerpc64-emb - 4.4.0.193.199
    linux-image-powerpc64-smp - 4.4.0.193.199
    linux-image-raspi2 - 4.4.0.1141.141
    linux-image-snapdragon - 4.4.0.1145.137
    linux-image-virtual - 4.4.0.193.199

    Ubuntu 14.04 ESM
    linux-image-4.4.0-1081-aws - 4.4.0-1081.85
    linux-image-4.4.0-193-generic - 4.4.0-193.224~14.04.1
    linux-image-4.4.0-193-generic-lpae - 4.4.0-193.224~14.04.1
    linux-image-4.4.0-193-lowlatency - 4.4.0-193.224~14.04.1
    linux-image-aws - 4.4.0.1081.78
    linux-image-generic-lpae-lts-xenial - 4.4.0.193.169
    linux-image-generic-lts-xenial - 4.4.0.193.169
    linux-image-lowlatency-lts-xenial - 4.4.0.193.169
    linux-image-virtual-lts-xenial - 4.4.0.193.169

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2018-10322
    * CVE-2020-14314
    * CVE-2020-16119
    * CVE-2020-25285

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Wednesday, October 14, 2020 00:10:04
    linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15,
    linux-gcp, linux-gcp-4.15, linux-gke-4.15, linux-hwe, linux-kvm,
    linux-oem, linux-oracle, linux-raspi2, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS
    * Ubuntu 14.04 ESM

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
    systems
    * linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-gke-4.15 - Linux kernel for Google Container Engine
    (GKE) systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oem - Linux kernel for OEM systems
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
    systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Hador Manor discovered that the DCCP protocol implementation in
    the Linux kernel improperly handled socket reuse, leading to a
    use-after-free vulnerability. A local attacker could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-16119)

    Wen Xu discovered that the XFS file system in the Linux kernel did
    not properly validate inode metadata in some situations. An
    attacker could use this to construct a malicious XFS image that,
    when mounted, could cause a denial of service (system crash).
    (CVE-2018-10322)

    It was discovered that the btrfs file system in the Linux kernel
    contained a use-after-free vulnerability when merging free space.
    An attacker could use this to construct a malicious btrfs image
    that, when mounted and operated on, could cause a denial of
    service (system crash). (CVE-2019-19448)

    Jay Shin discovered that the ext4 file system implementation in
    the Linux kernel did not properly handle directory access with
    broken indexing, leading to an out-of-bounds read vulnerability. A
    local attacker could use this to cause a denial of service (system
    crash). (CVE-2020-14314)

    Giuseppe Scrivano discovered that the overlay file system in the
    Linux kernel did not properly perform permission checks in some
    situations. A local attacker could possibly use this to bypass
    intended restrictions and gain read access to restricted files.
    (CVE-2020-16120)

    It was discovered that the NFS client implementation in the Linux
    kernel did not properly perform bounds checking before copying
    security labels in some situations. A local attacker could use
    this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2020-25212)

    It was discovered that the NFC implementation in the Linux kernel
    did not properly perform permissions checks when opening raw
    sockets. A local attacker could use this to create or listen to
    NFC traffic. (CVE-2020-26088)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1057-oracle - 4.15.0-1057.62
    linux-image-4.15.0-1072-gke - 4.15.0-1072.76
    linux-image-4.15.0-1073-raspi2 - 4.15.0-1073.78
    linux-image-4.15.0-1077-kvm - 4.15.0-1077.79
    linux-image-4.15.0-1086-aws - 4.15.0-1086.91
    linux-image-4.15.0-1086-gcp - 4.15.0-1086.98
    linux-image-4.15.0-1089-snapdragon - 4.15.0-1089.98
    linux-image-4.15.0-1099-azure - 4.15.0-1099.110
    linux-image-4.15.0-1099-oem - 4.15.0-1099.109
    linux-image-4.15.0-121-generic - 4.15.0-121.123
    linux-image-4.15.0-121-generic-lpae - 4.15.0-121.123
    linux-image-4.15.0-121-lowlatency - 4.15.0-121.123
    linux-image-aws-lts-18.04 - 4.15.0.1086.88
    linux-image-azure-lts-18.04 - 4.15.0.1099.72
    linux-image-gcp-lts-18.04 - 4.15.0.1086.104
    linux-image-generic - 4.15.0.121.108
    linux-image-generic-lpae - 4.15.0.121.108
    linux-image-gke - 4.15.0.1072.76
    linux-image-gke-4.15 - 4.15.0.1072.76
    linux-image-kvm - 4.15.0.1077.73
    linux-image-lowlatency - 4.15.0.121.108
    linux-image-oem - 4.15.0.1099.103
    linux-image-oracle-lts-18.04 - 4.15.0.1057.67
    linux-image-powerpc-e500mc - 4.15.0.121.108
    linux-image-powerpc-smp - 4.15.0.121.108
    linux-image-powerpc64-emb - 4.15.0.121.108
    linux-image-powerpc64-smp - 4.15.0.121.108
    linux-image-raspi2 - 4.15.0.1073.70
    linux-image-snapdragon - 4.15.0.1089.92
    linux-image-virtual - 4.15.0.121.108

    Ubuntu 16.04 LTS
    linux-image-4.15.0-1056-oracle - 4.15.0-1056.61~16.04.1
    linux-image-4.15.0-1085-aws - 4.15.0-1085.90~16.04.1
    linux-image-4.15.0-1086-gcp - 4.15.0-1086.98~16.04.1
    linux-image-4.15.0-1098-azure - 4.15.0-1098.109~16.04.1
    linux-image-4.15.0-120-generic - 4.15.0-120.122~16.04.1
    linux-image-4.15.0-120-generic-lpae -
    4.15.0-120.122~16.04.1
    linux-image-4.15.0-120-lowlatency - 4.15.0-120.122~16.04.1
    linux-image-aws-hwe - 4.15.0.1085.81
    linux-image-azure - 4.15.0.1098.92
    linux-image-gcp - 4.15.0.1086.87
    linux-image-generic-hwe-16.04 - 4.15.0.120.121
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.120.121
    linux-image-gke - 4.15.0.1086.87
    linux-image-lowlatency-hwe-16.04 - 4.15.0.120.121
    linux-image-oem - 4.15.0.120.121
    linux-image-oracle - 4.15.0.1056.46
    linux-image-virtual-hwe-16.04 - 4.15.0.120.121

    Ubuntu 14.04 ESM
    linux-image-4.15.0-1098-azure - 4.15.0-1098.109~14.04.1
    linux-image-azure - 4.15.0.1098.74

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2018-10322
    * CVE-2019-19448
    * CVE-2020-14314
    * CVE-2020-16119
    * CVE-2020-16120
    * CVE-2020-25212
    * CVE-2020-26088

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Wednesday, October 14, 2020 00:10:04
    linux, linux-aws, linux-aws-5.4, linux-azure, linux-azure-5.4,
    linux-gcp, linux-gcp-5.4, linux-hwe-5.4, linux-kvm, linux-oracle, linux-oracle-5.4, linux-raspi, linux-raspi-5.4 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-aws - Linux kernel for Amazon Web Services (AWS) systems
    * linux-azure - Linux kernel for Microsoft Azure Cloud systems
    * linux-gcp - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-kvm - Linux kernel for cloud environments
    * linux-oracle - Linux kernel for Oracle Cloud systems
    * linux-raspi - Linux kernel for Raspberry Pi (V8) systems
    * linux-aws-5.4 - Linux kernel for Amazon Web Services (AWS)
    systems
    * linux-azure-5.4 - Linux kernel for Microsoft Azure cloud
    systems
    * linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP)
    systems
    * linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
    * linux-oracle-5.4 - Linux kernel for Oracle Cloud systems
    * linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems

    Details

    Hador Manor discovered that the DCCP protocol implementation in
    the Linux kernel improperly handled socket reuse, leading to a
    use-after-free vulnerability. A local attacker could use this to
    cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2020-16119)

    Jay Shin discovered that the ext4 file system implementation in
    the Linux kernel did not properly handle directory access with
    broken indexing, leading to an out-of-bounds read vulnerability. A
    local attacker could use this to cause a denial of service (system
    crash). (CVE-2020-14314)

    David Alan Gilbert discovered that the XFS file system
    implementation in the Linux kernel did not properly perform
    metadata validation in some circumstances. A local attacker could
    use this to cause a denial of service. (CVE-2020-14385)

    Giuseppe Scrivano discovered that the overlay file system in the
    Linux kernel did not properly perform permission checks in some
    situations. A local attacker could possibly use this to bypass
    intended restrictions and gain read access to restricted files.
    (CVE-2020-16120)

    It was discovered that a race condition existed in the hugetlb
    sysctl implementation in the Linux kernel. A privileged attacker
    could use this to cause a denial of service (system crash).
    (CVE-2020-25285)

    It was discovered that the block layer subsystem in the Linux
    kernel did not properly handle zero-length requests. A local
    attacker could use this to cause a denial of service.
    (CVE-2020-25641)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1021-raspi - 5.4.0-1021.24
    linux-image-5.4.0-1026-kvm - 5.4.0-1026.27
    linux-image-5.4.0-1028-aws - 5.4.0-1028.29
    linux-image-5.4.0-1028-gcp - 5.4.0-1028.29
    linux-image-5.4.0-1028-oracle - 5.4.0-1028.29
    linux-image-5.4.0-1031-azure - 5.4.0-1031.32
    linux-image-5.4.0-51-generic - 5.4.0-51.56
    linux-image-5.4.0-51-generic-lpae - 5.4.0-51.56
    linux-image-5.4.0-51-lowlatency - 5.4.0-51.56
    linux-image-aws - 5.4.0.1028.29
    linux-image-azure - 5.4.0.1031.29
    linux-image-gcp - 5.4.0.1028.36
    linux-image-generic - 5.4.0.51.54
    linux-image-generic-hwe-20.04 - 5.4.0.51.54
    linux-image-generic-lpae - 5.4.0.51.54
    linux-image-generic-lpae-hwe-20.04 - 5.4.0.51.54
    linux-image-gke - 5.4.0.1028.36
    linux-image-kvm - 5.4.0.1026.24
    linux-image-lowlatency - 5.4.0.51.54
    linux-image-lowlatency-hwe-20.04 - 5.4.0.51.54
    linux-image-oem - 5.4.0.51.54
    linux-image-oem-osp1 - 5.4.0.51.54
    linux-image-oracle - 5.4.0.1028.25
    linux-image-raspi - 5.4.0.1021.56
    linux-image-raspi2 - 5.4.0.1021.56
    linux-image-virtual - 5.4.0.51.54
    linux-image-virtual-hwe-20.04 - 5.4.0.51.54

    Ubuntu 18.04 LTS
    linux-image-5.4.0-1021-raspi - 5.4.0-1021.24~18.04.1
    linux-image-5.4.0-1028-aws - 5.4.0-1028.29~18.04.1
    linux-image-5.4.0-1028-gcp - 5.4.0-1028.29~18.04.1
    linux-image-5.4.0-1028-oracle - 5.4.0-1028.29~18.04.1
    linux-image-5.4.0-1031-azure - 5.4.0-1031.32~18.04.1
    linux-image-5.4.0-51-generic - 5.4.0-51.56~18.04.1
    linux-image-5.4.0-51-generic-lpae - 5.4.0-51.56~18.04.1
    linux-image-5.4.0-51-lowlatency - 5.4.0-51.56~18.04.1
    linux-image-aws - 5.4.0.1028.13
    linux-image-azure - 5.4.0.1031.13
    linux-image-gcp - 5.4.0.1028.16
    linux-image-generic-hwe-18.04 - 5.4.0.51.56~18.04.45
    linux-image-generic-lpae-hwe-18.04 - 5.4.0.51.56~18.04.45
    linux-image-lowlatency-hwe-18.04 - 5.4.0.51.56~18.04.45
    linux-image-oracle - 5.4.0.1028.12
    linux-image-raspi-hwe-18.04 - 5.4.0.1021.25
    linux-image-snapdragon-hwe-18.04 - 5.4.0.51.56~18.04.45
    linux-image-virtual-hwe-18.04 - 5.4.0.51.56~18.04.45

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-14314
    * CVE-2020-14385
    * CVE-2020-16119
    * CVE-2020-16120
    * CVE-2020-25285
    * CVE-2020-25641

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Tuesday, October 20, 2020 00:10:00
    linux-oem-osp1, linux-raspi2-5.3 vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 18.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux-oem-osp1 - Linux kernel for OEM systems
    * linux-raspi2-5.3 - Linux kernel for Raspberry Pi (V8) systems

    Details

    Andy Nguyen discovered that the Bluetooth L2CAP implementation in
    the Linux kernel contained a type-confusion error. A physically
    proximate remote attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12351)

    Andy Nguyen discovered that the Bluetooth A2MP implementation in
    the Linux kernel did not properly initialize memory in some
    situations. A physically proximate remote attacker could use this
    to expose sensitive information (kernel memory). (CVE-2020-12352)

    Andy Nguyen discovered that the Bluetooth HCI event packet parser
    in the Linux kernel did not properly handle event advertisements
    of certain sizes, leading to a heap-based buffer overflow. A
    physically proximate remote attacker could use this to cause a
    denial of service (system crash) or possibly execute arbitrary
    code. (CVE-2020-24490)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 18.04 LTS
    linux-image-5.0.0-1070-oem-osp1 - 5.0.0-1070.76
    linux-image-5.3.0-1036-raspi2 - 5.3.0-1036.38
    linux-image-oem-osp1 - 5.0.0.1070.68
    linux-image-raspi2-hwe-18.04 - 5.3.0.1036.25

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-12351
    * CVE-2020-12352
    * CVE-2020-24490

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)
  • From boo_ubuntu@21:4/110 to Ubuntu Users on Tuesday, October 20, 2020 00:10:00
    linux, linux-hwe, linux-hwe-5.4, linux-oem, linux-raspi,
    linux-raspi-5.4, linux-snapdragon vulnerabilities

    A security issue affects these releases of Ubuntu and its
    derivatives:

    * Ubuntu 20.04 LTS
    * Ubuntu 18.04 LTS
    * Ubuntu 16.04 LTS

    Summary

    Several security issues were fixed in the Linux kernel.

    Software Description

    * linux - Linux kernel
    * linux-raspi - Linux kernel for Raspberry Pi (V8) systems
    * linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
    * linux-oem - Linux kernel for OEM systems
    * linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems
    * linux-snapdragon - Linux kernel for Qualcomm Snapdragon
    processors
    * linux-hwe - Linux hardware enablement (HWE) kernel

    Details

    Andy Nguyen discovered that the Bluetooth L2CAP implementation in
    the Linux kernel contained a type-confusion error. A physically
    proximate remote attacker could use this to cause a denial of
    service (system crash) or possibly execute arbitrary code.
    (CVE-2020-12351)

    Andy Nguyen discovered that the Bluetooth A2MP implementation in
    the Linux kernel did not properly initialize memory in some
    situations. A physically proximate remote attacker could use this
    to expose sensitive information (kernel memory). (CVE-2020-12352)

    Update instructions

    The problem can be corrected by updating your system to the
    following package versions:

    Ubuntu 20.04 LTS
    linux-image-5.4.0-1022-raspi - 5.4.0-1022.25
    linux-image-5.4.0-52-generic - 5.4.0-52.57
    linux-image-5.4.0-52-generic-lpae - 5.4.0-52.57
    linux-image-5.4.0-52-lowlatency - 5.4.0-52.57
    linux-image-generic - 5.4.0.52.55
    linux-image-generic-hwe-18.04 - 5.4.0.52.55
    linux-image-generic-hwe-18.04-edge - 5.4.0.52.55
    linux-image-generic-hwe-20.04 - 5.4.0.52.55
    linux-image-generic-lpae - 5.4.0.52.55
    linux-image-generic-lpae-hwe-18.04 - 5.4.0.52.55
    linux-image-generic-lpae-hwe-18.04-edge - 5.4.0.52.55
    linux-image-generic-lpae-hwe-20.04 - 5.4.0.52.55
    linux-image-lowlatency - 5.4.0.52.55
    linux-image-lowlatency-hwe-18.04 - 5.4.0.52.55
    linux-image-lowlatency-hwe-18.04-edge - 5.4.0.52.55
    linux-image-lowlatency-hwe-20.04 - 5.4.0.52.55
    linux-image-oem - 5.4.0.52.55
    linux-image-oem-osp1 - 5.4.0.52.55
    linux-image-raspi - 5.4.0.1022.57
    linux-image-raspi-hwe-18.04 - 5.4.0.1022.57
    linux-image-raspi-hwe-18.04-edge - 5.4.0.1022.57
    linux-image-raspi2 - 5.4.0.1022.57
    linux-image-raspi2-hwe-18.04 - 5.4.0.1022.57
    linux-image-raspi2-hwe-18.04-edge - 5.4.0.1022.57
    linux-image-virtual - 5.4.0.52.55
    linux-image-virtual-hwe-18.04 - 5.4.0.52.55
    linux-image-virtual-hwe-18.04-edge - 5.4.0.52.55
    linux-image-virtual-hwe-20.04 - 5.4.0.52.55

    Ubuntu 18.04 LTS
    linux-image-4.15.0-1090-snapdragon - 4.15.0-1090.99
    linux-image-4.15.0-1100-oem - 4.15.0-1100.110
    linux-image-4.15.0-122-generic - 4.15.0-122.124
    linux-image-4.15.0-122-generic-lpae - 4.15.0-122.124
    linux-image-4.15.0-122-lowlatency - 4.15.0-122.124
    linux-image-5.4.0-1022-raspi - 5.4.0-1022.25~18.04.1
    linux-image-5.4.0-52-generic - 5.4.0-52.57~18.04.1
    linux-image-5.4.0-52-generic-lpae - 5.4.0-52.57~18.04.1
    linux-image-5.4.0-52-lowlatency - 5.4.0-52.57~18.04.1
    linux-image-generic - 4.15.0.122.109
    linux-image-generic-hwe-18.04 - 5.4.0.52.57~18.04.46
    linux-image-generic-lpae - 4.15.0.122.109
    linux-image-generic-lpae-hwe-18.04 - 5.4.0.52.57~18.04.46
    linux-image-lowlatency - 4.15.0.122.109
    linux-image-lowlatency-hwe-18.04 - 5.4.0.52.57~18.04.46
    linux-image-oem - 4.15.0.1100.104
    linux-image-powerpc-e500mc - 4.15.0.122.109
    linux-image-powerpc-smp - 4.15.0.122.109
    linux-image-powerpc64-emb - 4.15.0.122.109
    linux-image-powerpc64-smp - 4.15.0.122.109
    linux-image-raspi-hwe-18.04 - 5.4.0.1022.26
    linux-image-snapdragon - 4.15.0.1090.93
    linux-image-snapdragon-hwe-18.04 - 5.4.0.52.57~18.04.46
    linux-image-virtual - 4.15.0.122.109
    linux-image-virtual-hwe-18.04 - 5.4.0.52.57~18.04.46

    Ubuntu 16.04 LTS
    linux-image-4.15.0-122-generic - 4.15.0-122.124~16.04.1
    linux-image-4.15.0-122-generic-lpae -
    4.15.0-122.124~16.04.1
    linux-image-4.15.0-122-lowlatency - 4.15.0-122.124~16.04.1
    linux-image-generic-hwe-16.04 - 4.15.0.122.122
    linux-image-generic-hwe-16.04-edge - 4.15.0.122.122
    linux-image-generic-lpae-hwe-16.04 - 4.15.0.122.122
    linux-image-generic-lpae-hwe-16.04-edge - 4.15.0.122.122
    linux-image-lowlatency-hwe-16.04 - 4.15.0.122.122
    linux-image-lowlatency-hwe-16.04-edge - 4.15.0.122.122
    linux-image-oem - 4.15.0.122.122
    linux-image-virtual-hwe-16.04 - 4.15.0.122.122
    linux-image-virtual-hwe-16.04-edge - 4.15.0.122.122

    To update your system, please follow these instructions:
    https://wiki.ubuntu.com/Security/Upgrades.

    After a standard system update you need to reboot your computer to
    make all the necessary changes.

    ATTENTION: Due to an unavoidable ABI change the kernel updates
    have been given a new version number, which requires you to
    recompile and reinstall all third party kernel modules you might
    have installed. Unless you manually uninstalled the standard
    kernel metapackages (e.g. linux-generic,
    linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
    standard system upgrade will automatically perform this as well.

    References

    * CVE-2020-12351
    * CVE-2020-12352

    --- Mystic BBS v1.12 A46 (Linux/64)
    * Origin: BZ&BZ BBS (21:4/110)