Linux Security
    Linux Security
    Linux Security

    Ubuntu 0061-1: Linux kernel vulnerability

    Date 08 Jan 2020
    426
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in the kernel.
    ==========================================================================
    Kernel Live Patch Security Notice 0061-1
    January 08, 2020
    
    linux vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu:
    
    | Series           | Base kernel  | Arch     | flavors          |
    |------------------+--------------+----------+------------------|
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | aws              |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | oem              |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | azure            |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | gcp              |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | aws              |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | azure            |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | lowlatency       |
    
    Summary:
    
    Several security issues were fixed in the kernel.
    
    Software Description:
    - linux: Linux kernel
    
    Details:
    
    It was discovered that a heap-based buffer overflow existed in the Marvell
    WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could
    use this to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-14895)
    
    It was discovered that a heap-based buffer overflow existed in the Marvell
    Libertas WLAN Driver for the Linux kernel. A physically proximate attacker
    could use this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2019-14896)
    
    It was discovered that a heap-based buffer overflow existed in the Marvell
    Libertas WLAN Driver for the Linux kernel. A physically proximate attacker
    could use this to cause a denial of service (system crash) or possibly
    execute arbitrary code. (CVE-2019-14897)
    
    It was discovered that a heap-based buffer overflow existed in the Marvell
    WiFi-Ex Driver for the Linux kernel. A physically proximate attacker could
    use this to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-14901)
    
    Jann Horn discovered that the OverlayFS and ShiftFS Drivers in the Linux
    kernel did not properly handle reference counting during memory mapping
    operations when used in conjunction with AUFS. A local attacker could use
    this to cause a denial of service (system crash) or possibly execute
    arbitrary code. (CVE-2019-15794)
    
    Update instructions:
    
    The problem can be corrected by updating your livepatches to the following
    versions:
    
    | Kernel                   | Version  | flavors                  |
    |--------------------------+----------+--------------------------|
    | 4.4.0-168.197            | 61.1     | generic, lowlatency      |
    | 4.4.0-169.198            | 61.1     | generic, lowlatency      |
    | 4.4.0-170.199            | 61.1     | lowlatency, generic      |
    | 4.4.0-1098.109           | 61.1     | aws                      |
    | 4.15.0-69.78             | 61.1     | generic, lowlatency      |
    | 4.15.0-69.78~16.04.1     | 61.1     | lowlatency, generic      |
    | 4.15.0-70.79             | 61.1     | lowlatency, generic      |
    | 4.15.0-70.79~16.04.1     | 61.1     | generic, lowlatency      |
    | 4.15.0-72.81             | 61.1     | generic, lowlatency      |
    | 4.15.0-72.81~16.04.1     | 61.1     | generic, lowlatency      |
    | 4.15.0-1054.56           | 61.1     | aws                      |
    | 4.15.0-1063.68           | 61.1     | azure                    |
    | 4.15.0-1063.72           | 61.1     | oem                      |
    | 4.15.0-1064.73           | 61.1     | oem                      |
    | 4.15.0-1065.75           | 61.1     | oem                      |
    | 5.0.0-1025.26~18.04.1    | 61.1     | gcp                      |
    | 5.0.0-1025.27~18.04.1    | 61.1     | azure                    |
    
    Support Information:
    
    Kernels older than the levels listed below do not receive livepatch
    updates. Please upgrade your kernel as soon as possible.
    
    | Series           | Version          | Flavors                  |
    |------------------+------------------+--------------------------|
    | Ubuntu 18.04 LTS | 4.15.0-1054      | aws                      |
    | Ubuntu 16.04 LTS | 4.4.0-1098       | aws                      |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | azure                    |
    | Ubuntu 16.04 LTS | 4.15.0-1063      | azure                    |
    | Ubuntu 18.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | gcp                      |
    | Ubuntu 16.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 14.04 LTS | 4.4.0-168        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0-1063      | oem                      |
    | Ubuntu 16.04 LTS | 4.4.0-168        | generic lowlatency       |
    
    References:
      CVE-2019-14895, CVE-2019-14896, CVE-2019-14897, CVE-2019-14901, 
      CVE-2019-15794
    
    
    -- 
    ubuntu-security-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
    

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"8","type":"x","order":"1","pct":27.59,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":20.69,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":51.72,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.