You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

==========================================================================
Ubuntu Security Notice USN-4388-1
June 09, 2020

linux-gke-5.0, linux-oem-osp1 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems
– linux-oem-osp1: Linux kernel for OEM systems

Details:

It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem’s scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2020-12464)

Bui Quang Minh discovered that the XDP socket implementation in the Linux
kernel did not properly validate meta-data passed from user space, leading
to an out-of-bounds write vulnerability. A local attacker with the
CAP_NET_ADMIN capability could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-12659)

Xiumei Mu discovered that the IPSec implementation in the Linux kernel did
not properly encrypt IPv6 traffic in some situations. An attacker could use
this to expose sensitive information. (CVE-2020-1749)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-5.0.0-1042-gke 5.0.0-1042.43
linux-image-5.0.0-1059-oem-osp1 5.0.0-1059.64
linux-image-gke-5.0 5.0.0.1042.27
linux-image-oem-osp1 5.0.0.1059.58

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4388-1
CVE-2020-0067, CVE-2020-0543, CVE-2020-12114, CVE-2020-12464,
CVE-2020-12659, CVE-2020-1749,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

Package Information:
https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1042.43
https://launchpad.net/ubuntu/+source/linux-oem-osp1/5.0.0-1059.64

—–BEGIN PGP SIGNATURE—–
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=WXTr
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4389-1
June 09, 2020

linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oracle
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oracle: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem’s scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2020-12464)

Bui Quang Minh discovered that the XDP socket implementation in the Linux
kernel did not properly validate meta-data passed from user space, leading
to an out-of-bounds write vulnerability. A local attacker with the
CAP_NET_ADMIN capability could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-12659)

Dmitry Vyukov discovered that the SELinux netlink security hook in the
Linux kernel did not validate messages in some situations. A privileged
attacker could use this to bypass SELinux netlink restrictions.
(CVE-2020-10751)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
linux-image-5.4.0-1015-aws 5.4.0-1015.15
linux-image-5.4.0-1015-gcp 5.4.0-1015.15
linux-image-5.4.0-1015-kvm 5.4.0-1015.15
linux-image-5.4.0-1015-oracle 5.4.0-1015.15
linux-image-5.4.0-1016-azure 5.4.0-1016.16
linux-image-5.4.0-37-generic 5.4.0-37.41
linux-image-5.4.0-37-generic-lpae 5.4.0-37.41
linux-image-5.4.0-37-lowlatency 5.4.0-37.41
linux-image-aws 5.4.0.1015.16
linux-image-azure 5.4.0.1016.16
linux-image-gcp 5.4.0.1015.14
linux-image-generic 5.4.0.37.40
linux-image-generic-hwe-20.04 5.4.0.37.40
linux-image-generic-lpae 5.4.0.37.40
linux-image-generic-lpae-hwe-20.04 5.4.0.37.40
linux-image-gke 5.4.0.1015.14
linux-image-kvm 5.4.0.1015.14
linux-image-lowlatency 5.4.0.37.40
linux-image-lowlatency-hwe-20.04 5.4.0.37.40
linux-image-oem 5.4.0.37.40
linux-image-oem-osp1 5.4.0.37.40
linux-image-oracle 5.4.0.1015.14
linux-image-virtual 5.4.0.37.40
linux-image-virtual-hwe-20.04 5.4.0.37.40

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4389-1
CVE-2020-0067, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114,
CVE-2020-12464, CVE-2020-12659,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

Package Information:
https://launchpad.net/ubuntu/+source/linux/5.4.0-37.41
https://launchpad.net/ubuntu/+source/linux-aws/5.4.0-1015.15
https://launchpad.net/ubuntu/+source/linux-azure/5.4.0-1016.16
https://launchpad.net/ubuntu/+source/linux-gcp/5.4.0-1015.15
https://launchpad.net/ubuntu/+source/linux-kvm/5.4.0-1015.15
https://launchpad.net/ubuntu/+source/linux-oracle/5.4.0-1015.15

—–BEGIN PGP SIGNATURE—–
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=+Do1
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4390-1
June 10, 2020

linux, linux-aws, linux-aws-hwe, linux-azure, linux-azure-4.15, linux-gcp,
linux-gke-4.15, linux-hwe, linux-kvm, linux-oem, linux-oracle
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure-4.15: Linux kernel for Microsoft Azure Cloud systems
– linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oem: Linux kernel for OEM systems
– linux-oracle: Linux kernel for Oracle Cloud systems
– linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem’s scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary co
de. (CVE-2020-12464)

Xiumei Mu discovered that the IPSec implementation in the Linux kernel did
not properly encrypt IPv6 traffic in some situations. An attacker could use
this to expose sensitive information. (CVE-2020-1749)

Dmitry Vyukov discovered that the SELinux netlink security hook in the
Linux kernel did not validate messages in some situations. A privileged
attacker could use this to bypass SELinux netlink restrictions.
(CVE-2020-10751)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-4.15.0-1045-oracle 4.15.0-1045.49
linux-image-4.15.0-106-generic 4.15.0-106.107
linux-image-4.15.0-106-generic-lpae 4.15.0-106.107
linux-image-4.15.0-106-lowlatency 4.15.0-106.107
linux-image-4.15.0-1063-gke 4.15.0-1063.66
linux-image-4.15.0-1067-kvm 4.15.0-1067.68
linux-image-4.15.0-1073-aws 4.15.0-1073.77
linux-image-4.15.0-1087-oem 4.15.0-1087.97
linux-image-4.15.0-1089-azure 4.15.0-1089.99
linux-image-aws-lts-18.04 4.15.0.1073.76
linux-image-azure-lts-18.04 4.15.0.1089.60
linux-image-generic 4.15.0.106.94
linux-image-generic-lpae 4.15.0.106.94
linux-image-gke 4.15.0.1063.65
linux-image-gke-4.15 4.15.0.1063.65
linux-image-kvm 4.15.0.1067.63
linux-image-lowlatency 4.15.0.106.94
linux-image-oem 4.15.0.1087.91
linux-image-oracle-lts-18.04 4.15.0.1045.54
linux-image-powerpc-e500mc 4.15.0.106.94
linux-image-powerpc-smp 4.15.0.106.94
linux-image-powerpc64-emb 4.15.0.106.94
linux-image-powerpc64-smp 4.15.0.106.94
linux-image-virtual 4.15.0.106.94

Ubuntu 16.04 LTS:
linux-image-4.15.0-1045-oracle 4.15.0-1045.49~16.04.1
linux-image-4.15.0-106-generic 4.15.0-106.107~16.04.1
linux-image-4.15.0-106-generic-lpae 4.15.0-106.107~16.04.1
linux-image-4.15.0-106-lowlatency 4.15.0-106.107~16.04.1
linux-image-4.15.0-1073-aws 4.15.0-1073.77~16.04.1
linux-image-4.15.0-1077-gcp 4.15.0-1077.87~16.04.1
linux-image-4.15.0-1089-azure 4.15.0-1089.99~16.04.1
linux-image-aws-hwe 4.15.0.1073.73
linux-image-azure 4.15.0.1089.84
linux-image-azure-edge 4.15.0.1089.84
linux-image-gcp 4.15.0.1077.79
linux-image-generic-hwe-16.04 4.15.0.106.111
linux-image-generic-lpae-hwe-16.04 4.15.0.106.111
linux-image-gke 4.15.0.1077.79
linux-image-lowlatency-hwe-16.04 4.15.0.106.111
linux-image-oem 4.15.0.106.111
linux-image-oracle 4.15.0.1045.38
linux-image-virtual-hwe-16.04 4.15.0.106.111

Ubuntu 14.04 ESM:
linux-image-4.15.0-1089-azure 4.15.0-1089.99~14.04.1
linux-image-azure 4.15.0.1089.66

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this
issue provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4390-1
CVE-2020-0067, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114,
CVE-2020-12464, CVE-2020-1749,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.15.0-106.107
https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1073.77
https://launchpad.net/ubuntu/+source/linux-azure-4.15/4.15.0-1089.99
https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1063.66
https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1067.68
https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1087.97
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1045.49
https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1073.77~16.04.1
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1089.99~16.04.1
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1077.87~16.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-106.107~16.04.1
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1045.49~16.04.1

—–BEGIN PGP SIGNATURE—–
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=hnhj
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4393-1
June 10, 2020

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel

Details:

It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did
not properly validate status lengths in messages received from an access
point, leading to a buffer overflow. A physically proximate attacker
controlling an access point could use this to construct messages that could
possibly result in arbitrary code execution. (CVE-2020-12654)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
linux-image-3.2.0-147-generic 3.2.0-147.194
linux-image-3.2.0-147-generic-pae 3.2.0-147.194
linux-image-3.2.0-147-highbank 3.2.0-147.194
linux-image-3.2.0-147-powerpc-smp 3.2.0-147.194
linux-image-3.2.0-147-powerpc64-smp 3.2.0-147.194
linux-image-3.2.0-147-virtual 3.2.0-147.194
linux-image-generic 3.2.0.147.161
linux-image-generic-pae 3.2.0.147.161
linux-image-highbank 3.2.0.147.161
linux-image-powerpc 3.2.0.147.161
linux-image-powerpc-smp 3.2.0.147.161
linux-image-powerpc64-smp 3.2.0.147.161
linux-image-server 3.2.0.147.161
linux-image-virtual 3.2.0.147.161

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4393-1
CVE-2020-0543, CVE-2020-12654,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

—–BEGIN PGP SIGNATURE—–
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=SCvf
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4387-1
June 09, 2020

linux, linux-aws, linux-aws-5.3, linux-azure, linux-azure-5.3, linux-gcp,
linux-gcp-5.3, linux-gke-5.3, linux-hwe, linux-kvm, linux-oracle,
linux-oracle-5.3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oracle: Linux kernel for Oracle Cloud systems
– linux-aws-5.3: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure-5.3: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp-5.3: Linux kernel for Google Cloud Platform (GCP) systems
– linux-gke-5.3: Linux kernel for Google Container Engine (GKE) systems
– linux-hwe: Linux hardware enablement (HWE) kernel
– linux-oracle-5.3: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem’s scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2020-12464)

Bui Quang Minh discovered that the XDP socket implementation in the Linux
kernel did not properly validate meta-data passed from user space, leading
to an out-of-bounds write vulnerability. A local attacker with the
CAP_NET_ADMIN capability could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-12659)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
linux-image-5.3.0-1023-aws 5.3.0-1023.25
linux-image-5.3.0-1023-kvm 5.3.0-1023.25
linux-image-5.3.0-1024-oracle 5.3.0-1024.26
linux-image-5.3.0-1026-gcp 5.3.0-1026.28
linux-image-5.3.0-1028-azure 5.3.0-1028.29
linux-image-5.3.0-59-generic 5.3.0-59.53
linux-image-5.3.0-59-generic-lpae 5.3.0-59.53
linux-image-5.3.0-59-lowlatency 5.3.0-59.53
linux-image-5.3.0-59-snapdragon 5.3.0-59.53
linux-image-aws 5.3.0.1023.34
linux-image-azure 5.3.0.1028.47
linux-image-gcp 5.3.0.1026.37
linux-image-generic 5.3.0.59.49
linux-image-generic-lpae 5.3.0.59.49
linux-image-gke 5.3.0.1026.37
linux-image-kvm 5.3.0.1023.21
linux-image-lowlatency 5.3.0.59.49
linux-image-oracle 5.3.0.1024.40
linux-image-snapdragon 5.3.0.59.49
linux-image-virtual 5.3.0.59.49

Ubuntu 18.04 LTS:
linux-image-5.3.0-1023-aws 5.3.0-1023.25~18.04.1
linux-image-5.3.0-1024-oracle 5.3.0-1024.26~18.04.1
linux-image-5.3.0-1026-gcp 5.3.0-1026.28~18.04.1
linux-image-5.3.0-1026-gke 5.3.0-1026.28~18.04.1
linux-image-5.3.0-1028-azure 5.3.0-1028.29~18.04.1
linux-image-5.3.0-59-generic 5.3.0-59.53~18.04.1
linux-image-5.3.0-59-generic-lpae 5.3.0-59.53~18.04.1
linux-image-5.3.0-59-lowlatency 5.3.0-59.53~18.04.1
linux-image-aws 5.3.0.1023.23
linux-image-azure 5.3.0.1028.25
linux-image-gcp 5.3.0.1026.21
linux-image-generic-hwe-18.04 5.3.0.59.113
linux-image-generic-lpae-hwe-18.04 5.3.0.59.113
linux-image-gke-5.3 5.3.0.1026.13
linux-image-gkeop-5.3 5.3.0.59.113
linux-image-lowlatency-hwe-18.04 5.3.0.59.113
linux-image-oracle 5.3.0.1024.22
linux-image-snapdragon-hwe-18.04 5.3.0.59.113
linux-image-virtual-hwe-18.04 5.3.0.59.113

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this
issue provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4387-1
CVE-2020-0067, CVE-2020-0543, CVE-2020-12114, CVE-2020-12464,
CVE-2020-12659, https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

Package Information:
https://launchpad.net/ubuntu/+source/linux/5.3.0-59.53
https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1023.25
https://launchpad.net/ubuntu/+source/linux-azure/5.3.0-1028.29
https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1026.28
https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1023.25
https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1024.26
https://launchpad.net/ubuntu/+source/linux-aws-5.3/5.3.0-1023.25~18.04.1
https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1028.29~18.04.1
https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1026.28~18.04.1
https://launchpad.net/ubuntu/+source/linux-gke-5.3/5.3.0-1026.28~18.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-59.53~18.04.1
https://launchpad.net/ubuntu/+source/linux-oracle-5.3/5.3.0-1024.26~18.04.1

—–BEGIN PGP SIGNATURE—–

iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl7gNPYACgkQLwmejQBe
gfT6+Q//VSnJDP6yGPV6TWujYMpT/TpPLkmyJmkXjhAB9FRdors2TQWbXJhMO62S
/VEchXkJ0zDIwGDMapPWh0XmFINZA1/1PvgS7Q5gjgtH4xZO+h0Ol73lgkkVLOfA
mw55uC3jbDQfXVKpluMMqsynKYVnY8AJXh3rd4jt/D0CBMffhjBjLFS33SgV8xIh
pVznjZzjHSEsP9dPpwMGU+iCg65Xz9LCelFGmEZ76yU8orwu9UiDhxh9KxlOM+Ep
OU76UKQ8XimZuZWC67BHmaaSaBOdCJn/wet/082BeABsCkC1Fpz1xpsdN+rK8rST
kZ0msQOvtxKf9pbpURMfKvpj8wjnaphi/5Z1mI6HK8gFEQbeF6RB3h5TbxybLAQl
MFQkugj/MruGSjRSuThppJJtsyLR/h9N6Fc5jP1OqGMRGDGVEltyUG0FvKeofYmO
0AYRkKxiuvyRSHRp4IqQyp0a4WYUnfd5UGGqojNs8yUqp6vXpTtyIo2bJxTkv4pQ
32PNp7A2SbDH3U/SHxI7aGrQBkAiVTd7HDOo8nmolZ319jKvPqxYaOj+kGhvRU2P
E985xkxLCNa6gW30rhCrH7Lu8mWiCgNID9v0bSJc106VyEY7kvzfFYK6EzSY+aoV
nCwQrPVkrzWOLvp7xw3Lk2T1f8QNnyUBsXnkoqPBpXujukGkMoI=
=rnFX
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4391-1
June 10, 2020

linux, linux-aws, linux-kvm vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS
– Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-kvm: Linux kernel for cloud environments
– linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle setxattr operations in some situations. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2019-19319)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

It was discovered that the USB susbsystem’s scatter-gather implementation
in the Linux kernel did not properly take data references in some
situations, leading to a use-after-free. A physically proximate attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2020-12464)

It was discovered that the DesignWare SPI controller driver in the Linux
kernel contained a race condition. A local attacker could possibly use this
to cause a denial of service (system crash). (CVE-2020-12769)

It was discovered that the exit signaling implementation in the Linux
kernel contained an integer overflow. A local attacker could use this to
cause a denial of service (arbitrary application crash). (CVE-2020-12826)

Xiumei Mu discovered that the IPSec implementation in the Linux kernel did
not properly encrypt IPv6 traffic in some situations. An attacker could use
this to expose sensitive information. (CVE-2020-1749)

Dmitry Vyukov discovered that the SELinux netlink security hook in the
Linux kernel did not validate messages in some situations. A privileged
attacker could use this to bypass SELinux netlink restrictions.
(CVE-2020-10751)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.4.0-1075-kvm 4.4.0-1075.82
linux-image-4.4.0-1109-aws 4.4.0-1109.120
linux-image-4.4.0-184-generic 4.4.0-184.214
linux-image-4.4.0-184-generic-lpae 4.4.0-184.214
linux-image-4.4.0-184-lowlatency 4.4.0-184.214
linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214
linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214
linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214
linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214
linux-image-aws 4.4.0.1109.113
linux-image-generic 4.4.0.184.190
linux-image-generic-lpae 4.4.0.184.190
linux-image-kvm 4.4.0.1075.73
linux-image-lowlatency 4.4.0.184.190
linux-image-powerpc-e500mc 4.4.0.184.190
linux-image-powerpc-smp 4.4.0.184.190
linux-image-powerpc64-emb 4.4.0.184.190
linux-image-powerpc64-smp 4.4.0.184.190
linux-image-virtual 4.4.0.184.190

Ubuntu 14.04 ESM:
linux-image-4.4.0-1073-aws 4.4.0-1073.77
linux-image-4.4.0-184-generic 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-generic-lpae 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-lowlatency 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-powerpc-e500mc 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-powerpc-smp 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-powerpc64-emb 4.4.0-184.214~14.04.1
linux-image-4.4.0-184-powerpc64-smp 4.4.0-184.214~14.04.1
linux-image-aws 4.4.0.1073.70
linux-image-generic-lpae-lts-xenial 4.4.0.184.161
linux-image-generic-lts-xenial 4.4.0.184.161
linux-image-lowlatency-lts-xenial 4.4.0.184.161
linux-image-powerpc-e500mc-lts-xenial 4.4.0.184.161
linux-image-powerpc-smp-lts-xenial 4.4.0.184.161
linux-image-powerpc64-emb-lts-xenial 4.4.0.184.161
linux-image-powerpc64-smp-lts-xenial 4.4.0.184.161
linux-image-virtual-lts-xenial 4.4.0.184.161

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4391-1
CVE-2019-19319, CVE-2020-0543, CVE-2020-10751, CVE-2020-12114,
CVE-2020-12464, CVE-2020-12769, CVE-2020-12826, CVE-2020-1749,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-184.214
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1109.120
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1075.82

—–BEGIN PGP SIGNATURE—–
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=dNPW
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4392-1
June 10, 2020

linux, linux-lts-trusty vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM
– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM

Details:

It was discovered that the Marvell WiFi-Ex Driver in the Linux kernel did
not properly validate status lengths in messages received from an access
point, leading to a buffer overflow. A physically proximate attacker
controlling an access point could use this to construct messages that could
possibly result in arbitrary code execution. (CVE-2020-12654)

It was discovered that memory contents previously stored in
microarchitectural special registers after RDRAND, RDSEED, and SGX EGETKEY
read operations on Intel client and Xeon E3 processors may be briefly
exposed to processes on the same or different processor cores. A local
attacker could use this to expose sensitive information. (CVE-2020-0543)

Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
linux-image-3.13.0-180-generic 3.13.0-180.231
linux-image-3.13.0-180-generic-lpae 3.13.0-180.231
linux-image-3.13.0-180-lowlatency 3.13.0-180.231
linux-image-3.13.0-180-powerpc-e500 3.13.0-180.231
linux-image-3.13.0-180-powerpc-e500mc 3.13.0-180.231
linux-image-3.13.0-180-powerpc-smp 3.13.0-180.231
linux-image-3.13.0-180-powerpc64-emb 3.13.0-180.231
linux-image-3.13.0-180-powerpc64-smp 3.13.0-180.231
linux-image-generic 3.13.0.180.189
linux-image-generic-lpae 3.13.0.180.189
linux-image-highbank 3.13.0.180.189
linux-image-lowlatency 3.13.0.180.189
linux-image-omap 3.13.0.180.189
linux-image-powerpc-e500 3.13.0.180.189
linux-image-powerpc-e500mc 3.13.0.180.189
linux-image-powerpc-smp 3.13.0.180.189
linux-image-powerpc64-emb 3.13.0.180.189
linux-image-powerpc64-smp 3.13.0.180.189
linux-image-server 3.13.0.180.189
linux-image-virtual 3.13.0.180.189

Ubuntu 12.04 ESM:
linux-image-3.13.0-180-generic 3.13.0-180.231~12.04.1
linux-image-3.13.0-180-generic-lpae 3.13.0-180.231~12.04.1
linux-image-3.13.0-180-lowlatency 3.13.0-180.231~12.04.1
linux-image-generic-lpae-lts-trusty 3.13.0.180.166
linux-image-generic-lts-trusty 3.13.0.180.166

Please note that the mitigation for CVE-2020-0543 requires a processor
microcode update to be applied, either from your system manufacturer
or via the intel-microcode package. The kernel update for this issue
provides the ability to disable the mitigation and to report
vulnerability status.

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4392-1
CVE-2020-0543, CVE-2020-12114, CVE-2020-12654,
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SRBDS

—–BEGIN PGP SIGNATURE—–
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=6I4T
—–END PGP SIGNATURE—–

Top
More in Preporuke
Sigurnosni nedostatak jezgre operacijskog sustava

Otkriven je sigurnosni nedostatak u jezgri operacijskog sustava Freebsd. Otkriveni nedostatak potencijalnim napadačima s fizičkim pristupom USB portu omogućuje stjecanje...

Close