linux, linux-aws, linux-aws-5.3, linux-aws-5.4, linux-aws-hwe,
linux-azure, linux-azure-4.15, linux-azure-5.4, linux-gcp,
linux-gcp-4.15, linux-gcp-5.4, linux-gke-4.15, linux-gke-5.0,
linux-gke-5.3, linux-hwe, linux-hwe-5.4, linux-kvm, linux-oem,
linux-oem-osp1, linux-oracle, linux-oracle-5.4, linux-raspi,
linux-raspi-5.4, linux-raspi2, linux-raspi2-5.3, linux-snapdragon
vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 20.04 LTS
* Ubuntu 18.04 LTS
* Ubuntu 16.04 LTS
* Ubuntu 14.04 ESM
Summary
The system could be made to crash or run programs as an
administrator.
Software Description
* linux - Linux kernel
* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
* linux-azure - Linux kernel for Microsoft Azure Cloud systems
* linux-gcp - Linux kernel for Google Cloud Platform (GCP)
systems
* linux-kvm - Linux kernel for cloud environments
* linux-oracle - Linux kernel for Oracle Cloud systems
* linux-raspi - Linux kernel for Raspberry Pi (V8) systems
* linux-aws-5.3 - Linux kernel for Amazon Web Services (AWS)
systems
* linux-aws-5.4 - Linux kernel for Amazon Web Services (AWS)
systems
* linux-azure-4.15 - Linux kernel for Microsoft Azure Cloud
systems
* linux-azure-5.4 - Linux kernel for Microsoft Azure cloud
systems
* linux-gcp-4.15 - Linux kernel for Google Cloud Platform (GCP)
systems
* linux-gcp-5.4 - Linux kernel for Google Cloud Platform (GCP)
systems
* linux-gke-4.15 - Linux kernel for Google Container Engine
(GKE) systems
* linux-gke-5.0 - Linux kernel for Google Container Engine (GKE)
systems
* linux-gke-5.3 - Linux kernel for Google Container Engine (GKE)
systems
* linux-hwe - Linux hardware enablement (HWE) kernel
* linux-hwe-5.4 - Linux hardware enablement (HWE) kernel
* linux-oem - Linux kernel for OEM systems
* linux-oem-osp1 - Linux kernel for OEM systems
* linux-oracle-5.4 - Linux kernel for Oracle Cloud systems
* linux-raspi-5.4 - Linux kernel for Raspberry Pi (V8) systems
* linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
* linux-raspi2-5.3 - Linux kernel for Raspberry Pi (V8) systems
* linux-snapdragon - Linux kernel for Qualcomm Snapdragon
processors
* linux-aws-hwe - Linux kernel for Amazon Web Services (AWS-HWE)
systems
Details
Or Cohen discovered that the AF_PACKET implementation in the Linux
kernel did not properly perform bounds checking in some
situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
Update instructions
The problem can be corrected by updating your system to the
following package versions:
Ubuntu 20.04 LTS
linux-image-5.4.0-1018-raspi - 5.4.0-1018.20
linux-image-5.4.0-1024-aws - 5.4.0-1024.24
linux-image-5.4.0-1024-gcp - 5.4.0-1024.24
linux-image-5.4.0-1024-oracle - 5.4.0-1024.24
linux-image-5.4.0-1025-azure - 5.4.0-1025.25
linux-image-5.4.0-47-generic - 5.4.0-47.51
linux-image-5.4.0-47-generic-lpae - 5.4.0-47.51
linux-image-5.4.0-47-lowlatency - 5.4.0-47.51
linux-image-aws - 5.4.0.1024.25
linux-image-azure - 5.4.0.1025.24
linux-image-gcp - 5.4.0.1024.21
linux-image-generic - 5.4.0.47.50
linux-image-generic-lpae - 5.4.0.47.50
linux-image-gke - 5.4.0.1024.21
linux-image-kvm - 5.4.0.1023.21
linux-image-lowlatency - 5.4.0.47.50
linux-image-oem - 5.4.0.47.50
linux-image-oem-osp1 - 5.4.0.47.50
linux-image-oracle - 5.4.0.1024.21
linux-image-raspi - 5.4.0.1018.53
linux-image-raspi2 - 5.4.0.1018.53
linux-image-virtual - 5.4.0.47.50
Ubuntu 18.04 LTS
linux-image-4.15.0-1053-oracle - 4.15.0-1053.57
linux-image-4.15.0-1069-gke - 4.15.0-1069.72
linux-image-4.15.0-1070-raspi2 - 4.15.0-1070.74
linux-image-4.15.0-1074-kvm - 4.15.0-1074.75
linux-image-4.15.0-1082-aws - 4.15.0-1082.86
linux-image-4.15.0-1083-gcp - 4.15.0-1083.94
linux-image-4.15.0-1086-snapdragon - 4.15.0-1086.94
linux-image-4.15.0-1095-azure - 4.15.0-1095.105
linux-image-4.15.0-1096-oem - 4.15.0-1096.106
linux-image-4.15.0-117-generic - 4.15.0-117.118
linux-image-4.15.0-117-generic-lpae - 4.15.0-117.118
linux-image-4.15.0-117-lowlatency - 4.15.0-117.118
linux-image-5.0.0-1047-gke - 5.0.0-1047.48
linux-image-5.0.0-1068-oem-osp1 - 5.0.0-1068.73
linux-image-5.3.0-1033-raspi2 - 5.3.0-1033.35
linux-image-5.3.0-1035-aws - 5.3.0-1035.37
linux-image-5.3.0-1036-gke - 5.3.0-1036.38
linux-image-5.3.0-67-generic - 5.3.0-67.61
linux-image-5.3.0-67-lowlatency - 5.3.0-67.61
linux-image-5.4.0-1018-raspi - 5.4.0-1018.20~18.04.1
linux-image-5.4.0-1024-aws - 5.4.0-1024.24~18.04.1
linux-image-5.4.0-1024-gcp - 5.4.0-1024.24~18.04.1
linux-image-5.4.0-1024-oracle - 5.4.0-1024.24~18.04.1
linux-image-5.4.0-1025-azure - 5.4.0-1025.25~18.04.1
linux-image-5.4.0-47-generic - 5.4.0-47.51~18.04.1
linux-image-5.4.0-47-generic-lpae - 5.4.0-47.51~18.04.1
linux-image-5.4.0-47-lowlatency - 5.4.0-47.51~18.04.1
linux-image-aws - 5.3.0.1035.34
linux-image-aws-lts-18.04 - 4.15.0.1082.84
linux-image-azure - 5.4.0.1025.8
linux-image-azure-lts-18.04 - 4.15.0.1095.68
linux-image-gcp - 5.4.0.1024.11
linux-image-gcp-lts-18.04 - 4.15.0.1083.101
linux-image-generic - 4.15.0.117.104
linux-image-generic-hwe-18.04 - 5.4.0.47.51~18.04.40
linux-image-generic-lpae - 4.15.0.117.104
linux-image-generic-lpae-hwe-18.04 - 5.4.0.47.51~18.04.40
linux-image-gke - 4.15.0.1069.73
linux-image-gke-4.15 - 4.15.0.1069.73
linux-image-gke-5.0 - 5.0.0.1047.32
linux-image-gke-5.3 - 5.3.0.1036.20
linux-image-gke-5.4 - 5.4.0.1024.11
linux-image-gkeop-5.3 - 5.3.0.67.124
linux-image-gkeop-5.4 - 5.4.0.47.51~18.04.40
linux-image-kvm - 4.15.0.1074.70
linux-image-lowlatency - 4.15.0.117.104
linux-image-lowlatency-hwe-18.04 - 5.4.0.47.51~18.04.40
linux-image-oem - 4.15.0.1096.100
linux-image-oem-osp1 - 5.0.0.1068.66
linux-image-oracle - 5.4.0.1024.8
linux-image-oracle-lts-18.04 - 4.15.0.1053.63
linux-image-powerpc-e500mc - 4.15.0.117.104
linux-image-powerpc-smp - 4.15.0.117.104
linux-image-powerpc64-emb - 4.15.0.117.104
linux-image-powerpc64-smp - 4.15.0.117.104
linux-image-raspi-hwe-18.04 - 5.4.0.1018.22
linux-image-raspi2 - 4.15.0.1070.67
linux-image-raspi2-hwe-18.04 - 5.3.0.1033.23
linux-image-snapdragon - 4.15.0.1086.89
linux-image-snapdragon-hwe-18.04 - 5.4.0.47.51~18.04.40
linux-image-virtual - 4.15.0.117.104
linux-image-virtual-hwe-18.04 - 5.4.0.47.51~18.04.40
Ubuntu 16.04 LTS
linux-image-4.15.0-1053-oracle - 4.15.0-1053.57~16.04.1
linux-image-4.15.0-1082-aws - 4.15.0-1082.86~16.04.1
linux-image-4.15.0-1083-gcp - 4.15.0-1083.94~16.04.1
linux-image-4.15.0-1095-azure - 4.15.0-1095.105~16.04.1
linux-image-4.15.0-117-generic - 4.15.0-117.118~16.04.1
linux-image-4.15.0-117-generic-lpae -
4.15.0-117.118~16.04.1
linux-image-4.15.0-117-lowlatency - 4.15.0-117.118~16.04.1
linux-image-aws-hwe - 4.15.0.1082.78
linux-image-azure - 4.15.0.1095.89
linux-image-gcp - 4.15.0.1083.84
linux-image-generic-hwe-16.04 - 4.15.0.117.118
linux-image-generic-lpae-hwe-16.04 - 4.15.0.117.118
linux-image-gke - 4.15.0.1083.84
linux-image-lowlatency-hwe-16.04 - 4.15.0.117.118
linux-image-oem - 4.15.0.117.118
linux-image-oracle - 4.15.0.1053.43
linux-image-virtual-hwe-16.04 - 4.15.0.117.118
Ubuntu 14.04 ESM
linux-image-4.15.0-1095-azure - 4.15.0-1095.105~14.04.1
linux-image-azure - 4.15.0.1095.71
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to reboot your computer to
make all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates
have been given a new version number, which requires you to
recompile and reinstall all third party kernel modules you might
have installed. Unless you manually uninstalled the standard
kernel metapackages (e.g. linux-generic,
linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a
standard system upgrade will automatically perform this as well.
References
* CVE-2020-14386
--- Mystic BBS v1.12 A46 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)