Linux Security
    Linux Security
    Linux Security

    Ubuntu 0063-1: Linux kernel vulnerability

    Date 19 Feb 2020
    199
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in the kernel.
    ==========================================================================
    Kernel Live Patch Security Notice 0063-1
    February 19, 2020
    
    linux vulnerability
    ==========================================================================
    
    A security issue affects these releases of Ubuntu:
    
    | Series           | Base kernel  | Arch     | flavors          |
    |------------------+--------------+----------+------------------|
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | aws              |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0       | amd64    | oem              |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | azure            |
    | Ubuntu 18.04 LTS | 5.0.0        | amd64    | gcp              |
    | Ubuntu 14.04 LTS | 4.4.0        | amd64    | generic          |
    | Ubuntu 14.04 LTS | 4.4.0        | amd64    | lowlatency       |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | aws              |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.4.0        | amd64    | lowlatency       |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | azure            |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | generic          |
    | Ubuntu 16.04 LTS | 4.15.0       | amd64    | lowlatency       |
    
    Summary:
    
    Several security issues were fixed in the kernel.
    
    Software Description:
    - linux: Linux kernel
    
    Details:
    
    Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
    when used as an access point would send IAPP location updates for stations
    before client authentication had completed. A physically proximate attacker
    could use this to cause a denial of service. (CVE-2019-5108)
    
    It was discovered that the Linux kernel did not properly clear data
    structures on context switches for certain Intel graphics processors. A
    local attacker could use this to expose sensitive information. 
    (CVE-2019-14615)
    
    It was discovered that the crypto subsystem in the Linux kernel did not
    properly deallocate memory in certain error conditions. A local attacker
    could use this to cause a denial of service (kernel memory exhaustion). 
    (CVE-2019-19050)
    
    It was discovered that the Datagram Congestion Control Protocol (DCCP)
    implementation in the Linux kernel did not properly deallocate memory in
    certain error conditions. An attacker could possibly use this to cause a
    denial of service (kernel memory exhaustion). (CVE-2019-20096)
    
    It was discovered that a race condition can lead to a use-after-free while
    destroying GEM contexts in the i915 driver for the Linux kernel. A local
    attacker could use this to cause a denial of service (system crash) or
    possibly execute arbitrary code. (CVE-2020-7053)
    
    Update instructions:
    
    The problem can be corrected by updating your livepatches to the following
    versions:
    
    | Kernel                   | Version  | flavors                  |
    |--------------------------+----------+--------------------------|
    | 4.4.0-168.197            | 63.1     | generic, lowlatency      |
    | 4.4.0-168.197~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-169.198            | 63.1     | generic, lowlatency      |
    | 4.4.0-169.198~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-170.199            | 63.1     | lowlatency, generic      |
    | 4.4.0-170.199~14.04.1    | 63.1     | lowlatency, generic      |
    | 4.4.0-171.200            | 63.1     | lowlatency, generic      |
    | 4.4.0-171.200~14.04.1    | 63.1     | generic, lowlatency      |
    | 4.4.0-173.203            | 63.1     | generic, lowlatency      |
    | 4.4.0-1098.109           | 63.1     | aws                      |
    | 4.4.0-1099.110           | 63.1     | aws                      |
    | 4.4.0-1100.111           | 63.1     | aws                      |
    | 4.4.0-1101.112           | 63.1     | aws                      |
    | 4.15.0-69.78             | 63.1     | generic, lowlatency      |
    | 4.15.0-69.78~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-70.79             | 63.1     | lowlatency, generic      |
    | 4.15.0-70.79~16.04.1     | 63.1     | generic, lowlatency      |
    | 4.15.0-72.81             | 63.1     | generic, lowlatency      |
    | 4.15.0-72.81~16.04.1     | 63.1     | generic, lowlatency      |
    | 4.15.0-74.83~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-74.84             | 63.1     | generic, lowlatency      |
    | 4.15.0-76.86             | 63.1     | generic, lowlatency      |
    | 4.15.0-76.86~16.04.1     | 63.1     | lowlatency, generic      |
    | 4.15.0-1054.56           | 63.1     | aws                      |
    | 4.15.0-1056.58           | 63.1     | aws                      |
    | 4.15.0-1057.59           | 63.1     | aws                      |
    | 4.15.0-1058.60           | 63.1     | aws                      |
    | 4.15.0-1063.68           | 63.1     | azure                    |
    | 4.15.0-1063.72           | 63.1     | oem                      |
    | 4.15.0-1064.69           | 63.1     | azure                    |
    | 4.15.0-1064.73           | 63.1     | oem                      |
    | 4.15.0-1065.75           | 63.1     | oem                      |
    | 4.15.0-1066.71           | 63.1     | azure                    |
    | 4.15.0-1066.76           | 63.1     | oem                      |
    | 4.15.0-1067.72           | 63.1     | azure                    |
    | 4.15.0-1067.77           | 63.1     | oem                      |
    | 5.0.0-1025.26~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1025.27~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1026.27~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1027.29~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1028.29~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1028.30~18.04.1    | 63.1     | azure                    |
    | 5.0.0-1029.30~18.04.1    | 63.1     | gcp                      |
    | 5.0.0-1029.31~18.04.1    | 63.1     | azure                    |
    
    Support Information:
    
    Kernels older than the levels listed below do not receive livepatch
    updates. Please upgrade your kernel as soon as possible.
    
    | Series           | Version          | Flavors                  |
    |------------------+------------------+--------------------------|
    | Ubuntu 18.04 LTS | 4.15.0-1054      | aws                      |
    | Ubuntu 16.04 LTS | 4.4.0-1098       | aws                      |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | azure                    |
    | Ubuntu 16.04 LTS | 4.15.0-1063      | azure                    |
    | Ubuntu 18.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 5.0.0-1025       | gcp                      |
    | Ubuntu 16.04 LTS | 4.15.0-69        | generic lowlatency       |
    | Ubuntu 14.04 LTS | 4.4.0-168        | generic lowlatency       |
    | Ubuntu 18.04 LTS | 4.15.0-1063      | oem                      |
    | Ubuntu 16.04 LTS | 4.4.0-168        | generic lowlatency       |
    
    References:
      CVE-2019-5108, CVE-2019-14615, CVE-2019-19050, CVE-2019-20096, 
      CVE-2020-7053
    
    
    -- 
    ubuntu-security-announce mailing list
    This email address is being protected from spambots. You need JavaScript enabled to view it.
    Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
    

    Advisories

    LinuxSecurity Poll

    'Tis the season of giving! How have you given back to the open-source community?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/49-tis-the-season-of-giving-how-have-you-given-back-to-the-open-source-community?task=poll.vote&format=json
    49
    radio
    [{"id":"171","title":"I've contributed to the development of an open-source project.","votes":"11","type":"x","order":"1","pct":34.38,"resources":[]},{"id":"172","title":"I've reviewed open-source code for security bugs.","votes":"6","type":"x","order":"2","pct":18.75,"resources":[]},{"id":"173","title":"I've made a donation to an open-source project.","votes":"15","type":"x","order":"3","pct":46.88,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350

    Please vote first in order to view vote results.


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.