Ubuntu 0063-1: Linux kernel vulnerability

    Date 19 Feb 2020
    120
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in the kernel.
    ==========================================================================
    Kernel Live Patch Security Notice 0063-1
    February 19, 2020
    
    linux vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu:
    
    | Series           | Base kernel  | Arch     | flavors          |
    |------------------+--------------+----------+------------------|
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | aws              |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | oem              |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | azure            |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | gcp              |
    | Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |
    | Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | aws              |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | azure            |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | lowlatency       |
    
    Summary:
    
    Several security issues were fixed in the kernel.
    
    Software Description:
    - linux: Linux kernel
    
    Details:
    
    Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
    when used as an access point would send IAPP location updates for stations
    before client authentication had completed. A physically proximate attacker
    could use this to cause a denial of service. (CVE-2019-5108)
    
    It was discovered that the Linux kernel did not properly clear data
    structures on context switches for certain Intel graphics processors. A
    local attacker could use this to expose sensitive information. 
    (CVE-2019-14615)
    
    It was discovered that the crypto subsystem in the Linux kernel did not
    properly deallocate memory in certain error conditions. A local attacker
    could use this to cause a denial of service (kernel memory exhaustion). 
    (CVE-2019-19050)
    
    It was discovered that the Datagram Congestion Control Protocol (DCCP)
    implementation in the Linux kernel did not properly deallocate memory in
    certain error conditions. An attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-20096)
    
    It was discovered that a race condition can lead to a use-after-free while
    destroying GEM contexts in the i915 driver for the Linux kernel. A local
    attacker could use this to cause a denial of service (system crash) or
    possibly execute arbitrary code. (CVE-2020-7053)
    
    Update instructions:
    
    The problem can be corrected by updating your livepatches to the following
    versions:
    
    | Kernel                   | Version  | flavors                  |
    |--------------------------+----------+--------------------------|
    | 4.4.0-168.197            | 63.1     | generic, lowlatency      |
    | 4.4.0-168.197~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-169.198            | 63.1     | generic, lowlatency      |
    | 4.4.0-169.198~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-170.199            | 63.1     | lowlatency, generic      |
    | 4.4.0-170.199~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-171.200            | 63.1     | lowlatency, generic      |
    | 4.4.0-171.200~14.04.1    | 63.1     | generic, lowlatency      |
    | 4.4.0-173.203            | 63.1     | generic, lowlatency      |
    | 4.4.0-1098.109           | 63.1     | aws                      |
    | 4.4.0-1099.110           | 63.1     | aws                      |
    | 4.4.0-1100.111           | 63.1     | aws                      |
    | 4.4.0-1101.112           | 63.1     | aws                      |
    | 4.15.0-69.78             | 63.1     | generic, lowlatency      |
    | 4.15.0-69.78~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-70.79             | 63.1     | lowlatency, generic      |
    | 4.15.0-70.79~16.04.1     | 63.1     | generic, lowlatency      |
    | 4.15.0-72.81             | 63.1     | generic, lowlatency      |
    | 4.15.0-72.81~16.04.1     | 63.1     | generic, lowlatency      |
    | 4.15.0-74.83~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-74.84             | 63.1     | generic, lowlatency      |
    | 4.15.0-76.86             | 63.1     | generic, lowlatency      |
    | 4.15.0-76.86~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-1054.56           | 63.1     | aws                      |
    | 4.15.0-1056.58           | 63.1     | aws                      |
    | 4.15.0-1057.59           | 63.1     | aws                      |
    | 4.15.0-1058.60           | 63.1     | aws                      |
    | 4.15.0-1063.68           | 63.1     | azure                    |
    | 4.15.0-1063.72           | 63.1     | oem                      |
    | 4.15.0-1064.69           | 63.1     | azure                    |
    | 4.15.0-1064.73           | 63.1     | oem                      |
    | 4.15.0-1065.75           | 63.1     | oem                      |
    | 4.15.0-1066.71           | 63.1     | azure                    |
    | 4.15.0-1066.76           | 63.1     | oem                      |
    | 4.15.0-1067.72           | 63.1     | azure                    |
    | 4.15.0-1067.77           | 63.1     | oem                      |
    | 5.0.0-1025.26~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1025.27~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1026.27~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1027.29~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1028.29~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1028.30~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1029.30~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1029.31~18.04.1    | 63.1     | azure                    |
    
    Support Information:
    
    Kernels older than the levels listed below do not receive livepatch
    updates. Please upgrade your kernel as soon as possible.
    
    | Series           | Version          | Flavors                  |
    |------------------+------------------+--------------------------|
    | Ubuntu 18.04 LTS | 4.15.0-1054      | aws                      |
    | Ubuntu 16.04 LTS | 4.4.0-1098       | aws                      |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | azure                    |
    | Ubuntu 16.04 LTS | 4.15.0-1063      | azure                    |
    | Ubuntu 18.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | gcp                      |
    | Ubuntu 16.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 14.04 LTS | 4.4.0-168        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0-1063      | oem                      |
    | Ubuntu 16.04 LTS | 4.4.0-168        | generic lowlatency       |
    
    References:
      CVE-2019-5108, CVE-2019-14615, CVE-2019-19050, CVE-2019-20096, 
      CVE-2020-7053
    
    
    -- 
    ubuntu-security-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
    

    LinuxSecurity Poll

    If you are using full-disk encryption: are you concerned about the resulting performance hit?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/34-if-you-are-using-full-disk-encryption-are-you-concerned-about-the-resulting-performance-hit?task=poll.vote&format=json
    34
    radio
    [{"id":"120","title":"Yes","votes":"13","type":"x","order":"1","pct":59.09,"resources":[]},{"id":"121","title":"No ","votes":"9","type":"x","order":"2","pct":40.91,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350
    bottom 200

    Advisories

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.