-
Kernel Live Patch Security Notice
From
bugz_ubuntu@21:4/110 to
Ubuntu Users on Tuesday, June 09, 2020 20:10:03
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 20.04 LTS
* Ubuntu 18.04 LTS
* Ubuntu 16.04 LTS
* Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel.
Software Description
* linux - Linux kernel
* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
* linux-oem - Linux kernel for OEM systems
Special Notice for CVE-2020-0543
On June 9, Intel announced CVE-2020-0543, a CPU hardware issue
known as Special Register Buffer Data Sampling (SRBDS), which
could result in data leaks from random number generation
instructions. The issue affects a subset of Intel CPUs and is
mitigated by a CPU microcode update. This is a hardware issue and
cannot be mitigated with a livepatch.
The kernel update associated with the CVE provides the ability to
turn the mitigation on and off and to report the presence of the
mitigation in the microcode, and should be installed with the
updated microcode.
To determine if your Intel CPU is affected, consult Intel's list
of affected processors. Note that AMD processors, and
architectures other than x86_64, are not affected by this CVE.
Users affected by this issue should update their kernel and CPU
microcode, and reboot into the new kernel. Users not affected by
CVE-2020-0543 may continue to use livepatch updates without
rebooting.
For more information about the CVE and our response, please
consult the Ubuntu SRBDS wiki page.
Details
It was discovered that the virtual terminal implementation in the
Linux kernel did not properly handle resize events. A local
attacker could use this to expose sensitive information.
(CVE-2020-8647)
It was discovered that the virtual terminal implementation in the
Linux kernel contained a race condition. A local attacker could
possibly use this to cause a denial of service (system crash) or
expose sensitive information. (CVE-2020-8648)
It was discovered that the virtual terminal implementation in the
Linux kernel did not properly handle resize events. A local
attacker could use this to expose sensitive information.
(CVE-2020-8649)
It was discovered that the Serial CAN interface driver in the
Linux kernel did not properly initialize data. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2020-11494)
Piotr Krysiuk discovered that race conditions existed in the file
system implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash).
(CVE-2020-12114)
Update instructions
The problem can be corrected by updating your kernel livepatch to
the following versions:
Ubuntu 18.04 LTS
aws - 68.1
generic - 68.1
lowlatency - 68.1
oem - 68.1
Ubuntu 16.04 LTS
aws - 68.1
generic - 67.1
generic - 68.1
lowlatency - 67.1
lowlatency - 68.1
Ubuntu 14.04 ESM
generic - 66.1
lowlatency - 66.1
Support Information
Kernels older than the levels listed below do not receive
livepatch updates. If you are running a kernel version earlier
than the one listed below, please upgrade your kernel as soon as
possible.
Ubuntu 18.04 LTS
linux - 4.15.0-69
linux-aws - 4.15.0-1054
linux-azure - 5.0.0-1025
linux-gcp - 5.0.0-1025
linux-oem - 4.15.0-1063
Ubuntu 20.04 LTS
linux - 5.4.0-26
linux-aws - 5.4.0-1009
linux-azure - 5.4.0-1010
linux-gcp - 5.4.0-1009
linux-oem - 5.4.0-26
Ubuntu 16.04 LTS
linux - 4.4.0-168
linux-aws - 4.4.0-1098
linux-azure - 4.15.0-1063
linux-hwe - 4.15.0-69
Ubuntu 14.04 ESM
linux-lts-xenial - 4.4.0-168
References
* CVE-2020-0543
* CVE-2020-8647
* CVE-2020-8648
* CVE-2020-8649
* CVE-2020-11494
* CVE-2020-12114
--- Mystic BBS v1.12 A45 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)
-
From
bugz_ubuntu@21:4/110 to
Ubuntu Users on Monday, July 27, 2020 16:10:02
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 18.04 LTS
* Ubuntu 20.04 LTS
* Ubuntu 16.04 LTS
Summary
Several security issues were fixed in the kernel.
Software Description
* linux - Linux kernel
* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
* linux-azure - Linux kernel for Microsoft Azure Cloud systems
* linux-gcp - Linux kernel for Google Cloud Platform (GCP)
systems
* linux-oem - Linux kernel for OEM systems
Details
Relay_open in kernel/relay.c in the Linux kernel through 5.4.1
allows local users to cause a denial of service (such as relay
blockage) by triggering a NULL alloc_percpu result.
(CVE-2019-19642)
Fan Yang discovered that the mremap implementation in the Linux
kernel did not properly handle DAX Huge Pages. A local attacker
with access to DAX storage could use this to gain administrative
privileges. (CVE-2020-10757)
It was discovered that the DesignWare SPI controller driver in the
Linux kernel contained a race condition. A local attacker could
possibly use this to cause a denial of service (system crash).
(CVE-2020-12769)
In the Linux kernel before 5.4.16, a race condition in
tty->disc_data handling in the slip and slcan line discipline
could lead to a use-after-free, aka CID-0ace17d56824. This affects
drivers/net/slip/slip.c and drivers/net/can/slcan.c.
(CVE-2020-14416)
Update instructions
The problem can be corrected by updating your kernel livepatch to
the following versions:
Ubuntu 18.04 LTS
aws - 69.1
generic - 69.1
lowlatency - 69.1
oem - 69.1
Ubuntu 20.04 LTS
aws - 69.1
azure - 69.1
gcp - 69.1
generic - 69.1
lowlatency - 69.1
Ubuntu 16.04 LTS
aws - 69.1
generic - 69.1
lowlatency - 69.1
Support Information
Kernels older than the levels listed below do not receive
livepatch updates. If you are running a kernel version earlier
than the one listed below, please upgrade your kernel as soon as
possible.
Ubuntu 18.04 LTS
linux-aws - 4.15.0-1054
linux-azure - 5.0.0-1025
linux-gcp - 5.0.0-1025
linux-oem - 4.15.0-1063
linux - 4.15.0-69
Ubuntu 20.04 LTS
linux-aws - 5.4.0-1009
linux-azure - 5.4.0-1010
linux-gcp - 5.4.0-1009
linux-oem - 5.4.0-26
linux - 5.4.0-26
Ubuntu 16.04 LTS
linux-aws - 4.4.0-1098
linux-azure - 4.15.0-1063
linux-hwe - 4.15.0-69
linux - 4.4.0-168
References
* CVE-2019-19642
* CVE-2020-10757
* CVE-2020-12769
* CVE-2020-14416
--- Mystic BBS v1.12 A45 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)
-
From
bugz_ubuntu@21:4/110 to
Ubuntu Users on Friday, September 11, 2020 00:10:06
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 16.04 LTS
* Ubuntu 18.04 LTS
* Ubuntu 20.04 LTS
Summary
A security issue was fixed in the 4.15 kernel. This issue affects
the 5.4 kernel as well, but a livepatch is not yet available.
While work is continuing to develop livepatches for all affected
kernels, due to the severity of the issue, we are releasing
patches as they become ready.
Software Description
* linux - Linux kernel
* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
* linux-oem - Linux kernel for OEM systems
Details
Or Cohen discovered that the AF_PACKET implementation in the Linux
kernel did not properly perform bounds checking in some
situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2020-14386)
Update instructions
The problem can be corrected by updating your kernel livepatch to
the following versions:
Ubuntu 18.04 LTS
aws - 71.1
generic - 71.1
lowlatency - 71.1
oem - 71.1
A mitigation is available if your kernel is affected, did not yet
receive a livepatch, and rebooting into the most recently released
kernel is not practical. If your system does not require the use
of unprivileged user namespaces, you may disable them and mitigate
the problem using the following command:
sudo sysctl kernel.unprivileged_userns_clone=0
Support Information
Kernels older than the levels listed below do not receive
livepatch updates. If you are running a kernel version earlier
than the one listed below, please upgrade your kernel as soon as
possible.
Ubuntu 18.04 LTS
linux-aws - 4.15.0-1054
linux-oem - 4.15.0-1063
linux - 4.15.0-69
Ubuntu 16.04 LTS
linux-azure - 4.15.0-1063
References
* CVE-2020-14386
--- Mystic BBS v1.12 A46 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)
-
From
boo_ubuntu@21:4/110 to
Ubuntu Users on Wednesday, October 14, 2020 16:10:07
Linux kernel vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
* Ubuntu 18.04 LTS
* Ubuntu 20.04 LTS
* Ubuntu 16.04 LTS
* Ubuntu 14.04 ESM
Summary
Several security issues were fixed in the kernel.
Software Description
* linux - Linux kernel
* linux-aws - Linux kernel for Amazon Web Services (AWS) systems
* linux-azure - Linux kernel for Microsoft Azure Cloud systems
* linux-gcp - Linux kernel for Google Cloud Platform (GCP)
systems
* linux-oem - Linux kernel for OEM systems
Details
It was discovered that the F2FS file system implementation in the
Linux kernel did not properly perform bounds checking on xattrs in
some situations. A local attacker could possibly use this to
expose sensitive information (kernel memory). (CVE-2020-0067)
It was discovered that the Serial CAN interface driver in the
Linux kernel did not properly initialize data. A local attacker
could use this to expose sensitive information (kernel memory).
(CVE-2020-11494)
Mauricio Faria de Oliveira discovered that the aufs implementation
in the Linux kernel improperly managed inode reference counts in
the vfsub_dentry_open() method. A local attacker could use this
vulnerability to cause a denial of service. (CVE-2020-11935)
Piotr Krysiuk discovered that race conditions existed in the file
system implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash).
(CVE-2020-12114)
Or Cohen discovered that the AF_PACKET implementation in the Linux
kernel did not properly perform bounds checking in some
situations. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code.
(CVE-2020-14386)
Hador Manor discovered that the DCCP protocol implementation in
the Linux kernel improperly handled socket reuse, leading to a
use-after-free vulnerability. A local attacker could use this to
cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2020-16119)
Giuseppe Scrivano discovered that the overlay file system in the
Linux kernel did not properly perform permission checks in some
situations. A local attacker could possibly use this to bypass
intended restrictions and gain read access to restricted files.
(CVE-2020-16120)
Update instructions
The problem can be corrected by updating your kernel livepatch to
the following versions:
Ubuntu 18.04 LTS
aws - 72.1
generic - 72.1
lowlatency - 72.1
oem - 72.1
Ubuntu 20.04 LTS
aws - 72.1
aws - 72.2
azure - 72.1
azure - 72.2
gcp - 72.1
gcp - 72.2
generic - 72.1
generic - 72.2
lowlatency - 72.1
lowlatency - 72.2
Ubuntu 16.04 LTS
aws - 72.1
generic - 72.1
lowlatency - 72.1
Ubuntu 14.04 ESM
generic - 72.1
lowlatency - 72.1
Support Information
Kernels older than the levels listed below do not receive
livepatch updates. If you are running a kernel version earlier
than the one listed below, please upgrade your kernel as soon as
possible.
Ubuntu 18.04 LTS
linux-aws - 4.15.0-1054
linux-azure - 5.0.0-1025
linux-gcp - 5.0.0-1025
linux-oem - 4.15.0-1063
linux-oracle - 5.0.0-1000
linux - 4.15.0-69
Ubuntu 20.04 LTS
linux-aws - 5.4.0-1009
linux-azure - 5.4.0-1010
linux-gcp - 5.4.0-1009
linux-oem - 5.4.0-26
linux - 5.4.0-26
Ubuntu 16.04 LTS
linux-aws - 4.4.0-1098
linux-azure - 4.15.0-1063
linux-hwe - 4.15.0-69
linux - 4.4.0-168
Ubuntu 14.04 ESM
linux-lts-xenial - 4.4.0-168
References
* CVE-2020-0067
* CVE-2020-11494
* CVE-2020-11935
* CVE-2020-12114
* CVE-2020-14386
* CVE-2020-16119
* CVE-2020-16120
--- Mystic BBS v1.12 A46 (Linux/64)
* Origin: BZ&BZ BBS (21:4/110)