Ubuntu 3984-1: Linux kernel vulnerabilities

    Date 14 May 2019
    105
    Posted By LinuxSecurity Advisories
    Several security issues were fixed in the Linux kernel.
    ==========================================================================
    Ubuntu Security Notice USN-3984-1
    May 15, 2019
    
    linux vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 12.04 ESM
    
    Summary:
    
    Several security issues were fixed in the Linux kernel.
    
    Software Description:
    - linux: Linux kernel
    
    Details:
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Giorgi Maisuradze, Dan
    Horea Lutas, Andrei Lutas, Volodymyr Pikhur, Stephan van Schaik, Alyssa
    Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos,
    Cristiano Giuffrida, Moritz Lipp, Michael Schwarz, and Daniel Gruss
    discovered that memory previously stored in microarchitectural fill buffers
    of an Intel CPU core may be exposed to a malicious process that is
    executing on the same CPU core. A local attacker could use this to expose
    sensitive information. (CVE-2018-12130)
    
    Brandon Falk, Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Stephan
    van Schaik, Alyssa Milburn, Sebastian Österlund, Pietro Frigo, Kaveh
    Razavi, Herbert Bos, and Cristiano Giuffrida discovered that memory
    previously stored in microarchitectural load ports of an Intel CPU core may
    be exposed to a malicious process that is executing on the same CPU core. A
    local attacker could use this to expose sensitive information.
    (CVE-2018-12127)
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Marina Minkin, Daniel
    Moghimi, Moritz Lipp, Michael Schwarz, Jo Van Bulck, Daniel Genkin, Daniel
    Gruss, Berk Sunar, Frank Piessens, and Yuval Yarom discovered that memory
    previously stored in microarchitectural store buffers of an Intel CPU core
    may be exposed to a malicious process that is executing on the same CPU
    core. A local attacker could use this to expose sensitive information.
    (CVE-2018-12126)
    
    Ke Sun, Henrique Kawakami, Kekai Hu, Rodrigo Branco, Volodrmyr Pikhur,
    Moritz Lipp, Michael Schwarz, Daniel Gruss, Stephan van Schaik, Alyssa
    Milburn, Sebastian Österlund, Pietro Frigo, Kaveh Razavi, Herbert Bos, and
    Cristiano Giuffrida discovered that uncacheable memory previously stored in
    microarchitectural buffers of an Intel CPU core may be exposed to a
    malicious process that is executing on the same CPU core. A local attacker
    could use this to expose sensitive information. (CVE-2019-11091)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 12.04 ESM:
      linux-image-3.2.0-140-generic   3.2.0-140.186
      linux-image-3.2.0-140-generic-pae  3.2.0-140.186
      linux-image-3.2.0-140-highbank  3.2.0-140.186
      linux-image-3.2.0-140-omap      3.2.0-140.186
      linux-image-3.2.0-140-powerpc-smp  3.2.0-140.186
      linux-image-3.2.0-140-powerpc64-smp  3.2.0-140.186
      linux-image-3.2.0-140-virtual   3.2.0-140.186
      linux-image-generic             3.2.0.140.155
      linux-image-generic-pae         3.2.0.140.155
      linux-image-highbank            3.2.0.140.155
      linux-image-omap                3.2.0.140.155
      linux-image-powerpc             3.2.0.140.155
      linux-image-powerpc-smp         3.2.0.140.155
      linux-image-powerpc64-smp       3.2.0.140.155
      linux-image-virtual             3.2.0.140.155
    
    After a standard system update you need to reboot your computer to make
    all the necessary changes.
    
    Please note that fully mitigating the Microarchitectural Data Sampling
    (MDS) issues (CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, and
    CVE-2019-11091) requires corresponding processor microcode/firmware
    updates or, in virtual environments, hypervisor updates.
    
    References:
      https://usn.ubuntu.com/usn/usn-3984-1
      CVE-2018-12126, CVE-2018-12127, CVE-2018-12130, CVE-2019-11091,
      https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/MDS
    
    

    LinuxSecurity Poll

    Have you ever used tcpdump for network troubleshooting or debugging?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /main-polls/36-have-you-ever-used-tcpdump-for-network-troubleshooting-or-debugging?task=poll.vote&format=json
    36
    radio
    [{"id":"125","title":"Yes","votes":"36","type":"x","order":"1","pct":80,"resources":[]},{"id":"126","title":"No ","votes":"9","type":"x","order":"2","pct":20,"resources":[]}] ["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"] ["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"] 350


    VIEW MORE POLLS

    bottom 200

    Please enable / Bitte aktiviere JavaScript!
    Veuillez activer / Por favor activa el Javascript![ ? ]

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.