-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
===========================================================================
AUSCERT External Security Bulletin Redistribution
ESB-2021.0326
Linux kernel vulnerabilities
29 January 2021
===========================================================================
AusCERT Security Bulletin Summary
---------------------------------
Product: kernel
Publisher: Ubuntu
Operating System: Ubuntu
Impact/Access: Execute Arbitrary Code/Commands -- Existing Account
Increased Privileges -- Existing Account
Modify Arbitrary Files -- Existing Account
Denial of Service -- Existing Account
Access Confidential Data -- Existing Account
Resolution: Patch/Upgrade
CVE Names: CVE-2020-28374 CVE-2020-27777 CVE-2020-25704
CVE-2020-25669 CVE-2019-19816 CVE-2019-19813
CVE-2018-13093
Reference: ESB-2021.0069
ESB-2020.4505
ESB-2020.4377
ESB-2020.4375
ESB-2018.3731
Original Bulletin:
https://ubuntu.com/security/notices/USN-4708-1
https://ubuntu.com/security/notices/USN-4709-1
https://ubuntu.com/security/notices/USN-4710-1
https://ubuntu.com/security/notices/USN-4711-1
https://ubuntu.com/security/notices/USN-4712-1
https://ubuntu.com/security/notices/USN-4713-1
Comment: This bulletin contains six (6) Ubuntu security advisories.
- --------------------------BEGIN INCLUDED TEXT--------------------
USN-4708-1: Linux kernel vulnerabilities
28 January 2021
Several security issues were fixed in the Linux kernel.
Releases
o Ubuntu 16.04 LTS
o Ubuntu 14.04 ESM
Packages
o linux - Linux kernel
o linux-lts-xenial - Linux hardware enablement kernel from Xenial for Trusty
Details
Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). ( CVE-2018-13093 )
It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). ( CVE-2019-19813 ,
CVE-2019-19816 )
Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
( CVE-2020-25669 )
Daniel Axtens discovered that PowerPC RTAS implementation in the Linux
kernel did not properly restrict memory accesses in some situations. A
privileged local attacker could use this to arbitrarily modify kernel
memory, potentially bypassing kernel lockdown restrictions.
( CVE-2020-27777 )
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 16.04
o linux-image-4.4.0-201-generic - 4.4.0-201.233
o linux-image-4.4.0-201-generic-lpae - 4.4.0-201.233
o linux-image-4.4.0-201-lowlatency - 4.4.0-201.233
o linux-image-4.4.0-201-powerpc-e500mc - 4.4.0-201.233
o linux-image-4.4.0-201-powerpc-smp - 4.4.0-201.233
o linux-image-4.4.0-201-powerpc64-emb - 4.4.0-201.233
o linux-image-4.4.0-201-powerpc64-smp - 4.4.0-201.233
o linux-image-generic - 4.4.0.201.207
o linux-image-generic-lpae - 4.4.0.201.207
o linux-image-lowlatency - 4.4.0.201.207
o linux-image-powerpc-e500mc - 4.4.0.201.207
o linux-image-powerpc-smp - 4.4.0.201.207
o linux-image-powerpc64-emb - 4.4.0.201.207
o linux-image-powerpc64-smp - 4.4.0.201.207
o linux-image-virtual - 4.4.0.201.207
Ubuntu 14.04
o linux-image-4.4.0-201-generic - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-generic-lpae - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-lowlatency - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-powerpc-e500mc - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-powerpc-smp - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-powerpc64-emb - 4.4.0-201.233~14.04.1
o linux-image-4.4.0-201-powerpc64-smp - 4.4.0-201.233~14.04.1
o linux-image-generic-lpae-lts-xenial - 4.4.0.201.176
o linux-image-generic-lts-xenial - 4.4.0.201.176
o linux-image-lowlatency-lts-xenial - 4.4.0.201.176
o linux-image-powerpc-e500mc-lts-xenial - 4.4.0.201.176
o linux-image-powerpc-smp-lts-xenial - 4.4.0.201.176
o linux-image-powerpc64-emb-lts-xenial - 4.4.0.201.176
o linux-image-powerpc64-smp-lts-xenial - 4.4.0.201.176
o linux-image-virtual-lts-xenial - 4.4.0.201.176
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2020-27777
o CVE-2018-13093
o CVE-2019-19816
o CVE-2020-25669
o CVE-2019-19813
Related notices
o USN-4680-1 : linux-aws-hwe, linux-image-lowlatency, linux-hwe,
linux-raspi2, linux-image-raspi2, linux, linux-gke-4.15, linux-gcp-4.15,
linux-image-4.15.0-129-lowlatency, linux-gcp,
linux-image-4.15.0-1077-raspi2, linux-image-4.15.0-129-generic,
linux-image-generic, linux-kvm, linux-image-4.15.0-1082-kvm,
linux-image-powerpc64-smp, linux-image-snapdragon,
linux-image-powerpc64-emb, linux-image-aws-lts-18.04, linux-oracle,
linux-azure-4.15, linux-image-generic-lpae-hwe-16.04, linux-image-gcp,
linux-image-oem, linux-image-azure, linux-image-4.15.0-1094-snapdragon,
linux-image-generic-lpae, linux-image-virtual-hwe-16.04, linux-image-kvm,
linux-image-lowlatency-hwe-16.04, linux-image-4.15.0-1103-azure, linux-aws,
linux-image-oracle-lts-18.04, linux-image-aws-hwe, linux-snapdragon,
linux-image-4.15.0-1077-gke, linux-image-generic-hwe-16.04,
linux-image-4.15.0-1091-gcp, linux-image-virtual,
linux-image-4.15.0-1062-oracle, linux-image-4.15.0-129-generic-lpae,
linux-image-gcp-lts-18.04, linux-azure, linux-image-oracle,
linux-image-powerpc-smp, linux-image-gke-4.15, linux-image-gke,
linux-image-powerpc-e500mc, linux-image-4.15.0-1091-aws,
linux-image-azure-lts-18.04
o USN-4679-1 : linux-image-lowlatency, linux-image-raspi2, linux-azure-5.4,
linux, linux-oracle-5.4, linux-raspi, linux-image-generic-hwe-18.04,
linux-kvm, linux-gcp, linux-image-generic, linux-gke-5.4,
linux-image-raspi, linux-image-raspi-hwe-18.04, linux-raspi-5.4,
linux-image-5.4.0-1026-raspi, linux-image-5.4.0-59-generic-lpae,
linux-oracle, linux-image-5.4.0-1031-kvm, linux-image-gcp, linux-image-oem,
linux-image-azure, linux-image-generic-lpae, linux-image-5.4.0-1034-aws,
linux-image-kvm, linux-gcp-5.4, linux-image-5.4.0-59-generic,
linux-image-5.4.0-1033-gcp, linux-aws, linux-image-oem-osp1,
linux-image-5.4.0-1034-oracle, linux-image-lowlatency-hwe-18.04,
linux-image-generic-lpae-hwe-18.04, linux-aws-5.4, linux-image-gke-5.4,
linux-image-virtual, linux-azure, linux-hwe-5.4,
linux-image-virtual-hwe-18.04, linux-image-oracle,
linux-image-5.4.0-1035-azure, linux-image-aws, linux-image-5.4.0-1033-gke,
linux-image-snapdragon-hwe-18.04, linux-image-5.4.0-59-lowlatency
o USN-4414-1 : linux-aws-hwe, linux-image-lowlatency, linux-hwe,
linux-raspi2, linux-image-raspi2, linux-image-4.15.0-1048-oracle, linux,
linux-gke-4.15, linux-image-4.15.0-1065-raspi2, linux-gcp-4.15, linux-kvm,
linux-gcp, linux-image-4.15.0-1078-gcp, linux-image-generic,
linux-image-4.15.0-107-generic, linux-image-powerpc64-smp,
linux-image-snapdragon, linux-image-powerpc64-emb,
linux-image-aws-lts-18.04, linux-image-4.15.0-1064-gke, linux-oracle,
linux-image-4.15.0-109-lowlatency, linux-azure-4.15,
linux-image-4.15.0-1046-oracle, linux-image-4.15.0-1081-snapdragon,
linux-image-4.15.0-1091-azure, linux-image-azure, linux-image-gcp,
linux-image-4.15.0-1091-oem, linux-image-generic-lpae-hwe-16.04,
linux-image-4.15.0-109-generic, linux-image-generic-lpae, linux-image-oem,
linux-image-kvm, linux-image-virtual-hwe-16.04,
linux-image-lowlatency-hwe-16.04, linux-oem, linux-image-4.15.0-1077-aws,
linux-aws, linux-image-oracle-lts-18.04, linux-image-4.15.0-1069-kvm,
linux-image-aws-hwe, linux-snapdragon, linux-image-generic-hwe-16.04,
linux-image-virtual, linux-image-4.15.0-109-generic-lpae,
linux-image-gcp-lts-18.04, linux-azure, linux-image-oracle,
linux-image-4.15.0-107-generic-lpae, linux-image-powerpc-smp,
linux-image-gke-4.15, linux-image-4.15.0-107-lowlatency, linux-image-gke,
linux-image-powerpc-e500mc, linux-image-azure-lts-18.04,
linux-image-4.15.0-1074-aws
o USN-4709-1 : linux-image-snapdragon, linux-aws, linux-raspi2,
linux-image-raspi2, linux-image-4.4.0-1087-kvm,
linux-image-4.4.0-1145-raspi2, linux-image-4.4.0-1149-snapdragon,
linux-image-aws, linux-snapdragon, linux-image-4.4.0-1085-aws, linux-kvm,
linux-image-kvm
o USN-4118-1 : linux-aws-hwe, linux-image-4.15.0-1047-aws, linux-aws,
linux-image-aws-hwe, linux-image-aws
o USN-4094-1 : linux-image-4.15.0-1055-azure,
linux-image-4.15.0-1060-snapdragon, linux-image-lowlatency,
linux-image-4.15.0-1040-gcp, linux-hwe, linux-image-4.15.0-58-generic-lpae,
linux-raspi2, linux-image-raspi2, linux-image-4.15.0-1050-oem,
linux-gke-4.15, linux, linux-kvm, linux-gcp, linux-image-generic,
linux-image-powerpc64-smp, linux-image-snapdragon,
linux-image-powerpc64-emb, linux-oracle,
linux-image-generic-lpae-hwe-16.04, linux-image-gcp, linux-image-oem,
linux-image-azure, linux-image-4.15.0-1043-raspi2,
linux-image-generic-lpae, linux-image-virtual-hwe-16.04, linux-image-kvm,
linux-image-lowlatency-hwe-16.04, linux-oem,
linux-image-4.15.0-58-lowlatency, linux-snapdragon,
linux-image-4.15.0-1040-gke, linux-image-4.15.0-1021-oracle,
linux-image-generic-hwe-16.04, linux-image-4.15.0-58-generic,
linux-image-4.15.0-1042-kvm, linux-azure, linux-image-oracle,
linux-image-powerpc-smp, linux-image-gke-4.15, linux-image-gke,
linux-image-powerpc-e500mc, linux-image-virtual
- --------------------------------------------------------------------------------
USN-4709-1: Linux kernel vulnerabilities
28 January 2021
Several security issues were fixed in the Linux kernel.
Releases
o Ubuntu 16.04 LTS
o Ubuntu 14.04 ESM
Packages
o linux-aws - Linux kernel for Amazon Web Services (AWS) systems
o linux-kvm - Linux kernel for cloud environments
o linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
o linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors
Details
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. ( CVE-2020-28374 )
Wen Xu discovered that the XFS filesystem implementation in the Linux
kernel did not properly track inode validations. An attacker could use this
to construct a malicious XFS image that, when mounted, could cause a denial
of service (system crash). ( CVE-2018-13093 )
It was discovered that the btrfs file system implementation in the Linux
kernel did not properly validate file system metadata in some situations.
An attacker could use this to construct a malicious btrfs image that, when
mounted, could cause a denial of service (system crash). ( CVE-2019-19813 ,
CVE-2019-19816 )
Bodong Zhao discovered a use-after-free in the Sun keyboard driver
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service or possibly execute arbitrary code.
( CVE-2020-25669 )
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 16.04
o linux-image-4.4.0-1087-kvm - 4.4.0-1087.96
o linux-image-4.4.0-1145-raspi2 - 4.4.0-1145.155
o linux-image-4.4.0-1149-snapdragon - 4.4.0-1149.159
o linux-image-kvm - 4.4.0.1087.85
o linux-image-raspi2 - 4.4.0.1145.145
o linux-image-snapdragon - 4.4.0.1149.141
Ubuntu 14.04
o linux-image-4.4.0-1085-aws - 4.4.0-1085.89
o linux-image-aws - 4.4.0.1085.82
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2020-28374
o CVE-2019-19816
o CVE-2020-25669
o CVE-2019-19813
o CVE-2018-13093
Related notices
o USN-4694-1 : linux-image-5.4.0-62-generic-lpae, linux-image-lowlatency,
linux-hwe, linux-image-4.4.0-200-powerpc-smp, linux-image-5.4.0-62-generic,
linux, linux-image-4.4.0-200-powerpc-e500mc, linux-image-generic-hwe-18.04,
linux-image-5.8.0-38-lowlatency, linux-image-generic,
linux-image-4.15.0-132-lowlatency, linux-image-4.4.0-200-generic,
linux-image-generic-hwe-20.04, linux-image-powerpc-e500mc-lts-xenial,
linux-image-powerpc64-smp, linux-image-powerpc64-emb-lts-xenial,
linux-image-powerpc64-emb, linux-hwe-5.8, linux-image-5.8.0-38-generic-64k,
linux-image-4.15.0-132-generic, linux-image-4.4.0-200-generic-lpae,
linux-image-generic-lpae-hwe-16.04, linux-image-virtual-lts-xenial,
linux-image-oem, linux-image-5.8.0-38-generic-lpae,
linux-image-5.8.0-38-generic, linux-image-generic-lpae,
linux-image-5.4.0-62-lowlatency, linux-image-powerpc64-smp-lts-xenial,
linux-image-virtual-hwe-16.04, linux-image-generic-lts-xenial,
linux-image-lowlatency-hwe-16.04, linux-image-4.4.0-200-powerpc64-emb,
linux-image-4.4.0-200-powerpc64-smp, linux-image-lowlatency-hwe-20.04,
linux-image-4.4.0-200-lowlatency, linux-image-oem-osp1,
linux-image-lowlatency-hwe-18.04, linux-image-powerpc-smp-lts-xenial,
linux-image-generic-lpae-hwe-18.04, linux-image-4.15.0-132-generic-lpae,
linux-image-generic-hwe-16.04, linux-image-generic-lpae-lts-xenial,
linux-image-virtual-hwe-20.04, linux-image-generic-lpae-hwe-20.04,
linux-image-virtual, linux-hwe-5.4, linux-image-generic-64k,
linux-image-virtual-hwe-18.04, linux-image-powerpc-smp,
linux-image-powerpc-e500mc, linux-lts-xenial,
linux-image-snapdragon-hwe-18.04, linux-image-lowlatency-lts-xenial
o USN-4414-1 : linux-aws-hwe, linux-image-lowlatency, linux-hwe,
linux-raspi2, linux-image-raspi2, linux-image-4.15.0-1048-oracle, linux,
linux-gke-4.15, linux-image-4.15.0-1065-raspi2, linux-gcp-4.15, linux-kvm,
linux-gcp, linux-image-4.15.0-1078-gcp, linux-image-generic,
linux-image-4.15.0-107-generic, linux-image-powerpc64-smp,
linux-image-snapdragon, linux-image-powerpc64-emb,
linux-image-aws-lts-18.04, linux-image-4.15.0-1064-gke, linux-oracle,
linux-image-4.15.0-109-lowlatency, linux-azure-4.15,
linux-image-4.15.0-1046-oracle, linux-image-4.15.0-1081-snapdragon,
linux-image-4.15.0-1091-azure, linux-image-azure, linux-image-gcp,
linux-image-4.15.0-1091-oem, linux-image-generic-lpae-hwe-16.04,
linux-image-4.15.0-109-generic, linux-image-generic-lpae, linux-image-oem,
linux-image-kvm, linux-image-virtual-hwe-16.04,
linux-image-lowlatency-hwe-16.04, linux-oem, linux-image-4.15.0-1077-aws,
linux-aws, linux-image-oracle-lts-18.04, linux-image-4.15.0-1069-kvm,
linux-image-aws-hwe, linux-snapdragon, linux-image-generic-hwe-16.04,
linux-image-virtual, linux-image-4.15.0-109-generic-lpae,
linux-image-gcp-lts-18.04, linux-azure, linux-image-oracle,
linux-image-4.15.0-107-generic-lpae, linux-image-powerpc-smp,
linux-image-gke-4.15, linux-image-4.15.0-107-lowlatency, linux-image-gke,
linux-image-powerpc-e500mc, linux-image-azure-lts-18.04,
linux-image-4.15.0-1074-aws
o USN-4713-1 : linux-image-5.4.0-1037-oracle, linux-raspi,
linux-image-5.8.0-1020-azure, linux-kvm, linux-gcp, linux-image-raspi,
linux-oracle, linux-image-5.4.0-1037-aws, linux-image-raspi-nolpae,
linux-image-gcp, linux-image-azure, linux-image-kvm,
linux-image-5.8.0-1021-aws, linux-image-5.4.0-1032-kvm, linux-aws,
linux-image-5.4.0-1039-azure, linux-image-5.8.0-1013-raspi,
linux-image-5.8.0-1018-oracle, linux-image-5.8.0-1013-raspi-nolpae,
linux-image-5.8.0-1016-kvm, linux-image-5.4.0-1036-gcp, linux-aws-5.4,
linux-azure, linux-image-oracle, linux-image-aws
o USN-4118-1 : linux-aws-hwe, linux-image-4.15.0-1047-aws, linux-aws,
linux-image-aws-hwe, linux-image-aws
o USN-4708-1 : linux-image-4.4.0-201-powerpc64-emb, linux-image-lowlatency,
linux-image-4.4.0-201-generic-lpae, linux, linux-image-generic,
linux-image-powerpc-e500mc-lts-xenial, linux-image-powerpc64-smp,
linux-image-powerpc64-emb-lts-xenial, linux-image-powerpc64-emb,
linux-image-virtual-lts-xenial, linux-image-4.4.0-201-powerpc-smp,
linux-image-generic-lpae, linux-image-4.4.0-201-generic,
linux-image-powerpc64-smp-lts-xenial, linux-image-generic-lts-xenial,
linux-image-powerpc-smp-lts-xenial, linux-image-4.4.0-201-powerpc64-smp,
linux-image-generic-lpae-lts-xenial, linux-image-4.4.0-201-lowlatency,
linux-image-powerpc-smp, linux-image-powerpc-e500mc, linux-lts-xenial,
linux-image-virtual, linux-image-4.4.0-201-powerpc-e500mc,
linux-image-lowlatency-lts-xenial
o USN-4094-1 : linux-image-4.15.0-1055-azure,
linux-image-4.15.0-1060-snapdragon, linux-image-lowlatency,
linux-image-4.15.0-1040-gcp, linux-hwe, linux-image-4.15.0-58-generic-lpae,
linux-raspi2, linux-image-raspi2, linux-image-4.15.0-1050-oem,
linux-gke-4.15, linux, linux-kvm, linux-gcp, linux-image-generic,
linux-image-powerpc64-smp, linux-image-snapdragon,
linux-image-powerpc64-emb, linux-oracle,
linux-image-generic-lpae-hwe-16.04, linux-image-gcp, linux-image-oem,
linux-image-azure, linux-image-4.15.0-1043-raspi2,
linux-image-generic-lpae, linux-image-virtual-hwe-16.04, linux-image-kvm,
linux-image-lowlatency-hwe-16.04, linux-oem,
linux-image-4.15.0-58-lowlatency, linux-snapdragon,
linux-image-4.15.0-1040-gke, linux-image-4.15.0-1021-oracle,
linux-image-generic-hwe-16.04, linux-image-4.15.0-58-generic,
linux-image-4.15.0-1042-kvm, linux-azure, linux-image-oracle,
linux-image-powerpc-smp, linux-image-gke-4.15, linux-image-gke,
linux-image-powerpc-e500mc, linux-image-virtual
o USN-4711-1 : linux-image-4.15.0-1078-raspi2, linux-image-snapdragon,
linux-aws, linux-raspi2, linux-image-oracle-lts-18.04,
linux-image-aws-lts-18.04, linux-image-raspi2, linux-image-4.15.0-1084-kvm,
linux-oracle, linux-snapdragon, linux-image-4.15.0-1093-aws,
linux-image-4.15.0-1064-oracle, linux-image-4.15.0-1095-snapdragon,
linux-kvm, linux-image-kvm
- --------------------------------------------------------------------------------
USN-4710-1: Linux kernel vulnerability
28 January 2021
The system could be made to crash under certain conditions.
Releases
o Ubuntu 18.04 LTS
Packages
o linux - Linux kernel
Details
Kiyin () discovered that the perf subsystem in the Linux kernel did
not properly deallocate memory in some situations. A privileged attacker
could use this to cause a denial of service (kernel memory exhaustion).
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 18.04
o linux-image-4.15.0-135-generic - 4.15.0-135.139
o linux-image-4.15.0-135-generic-lpae - 4.15.0-135.139
o linux-image-4.15.0-135-lowlatency - 4.15.0-135.139
o linux-image-generic - 4.15.0.135.122
o linux-image-generic-lpae - 4.15.0.135.122
o linux-image-lowlatency - 4.15.0.135.122
o linux-image-powerpc-e500mc - 4.15.0.135.122
o linux-image-powerpc-smp - 4.15.0.135.122
o linux-image-powerpc64-emb - 4.15.0.135.122
o linux-image-powerpc64-smp - 4.15.0.135.122
o linux-image-virtual - 4.15.0.135.122
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2020-25704
Related notices
o USN-4679-1 : linux-image-aws, linux-gcp-5.4, linux-image-gke-5.4,
linux-kvm, linux-image-5.4.0-1035-azure, linux-image-oem-osp1,
linux-image-generic-hwe-18.04, linux-image-5.4.0-59-lowlatency,
linux-hwe-5.4, linux-aws-5.4, linux-image-gcp,
linux-image-virtual-hwe-18.04, linux-image-5.4.0-59-generic-lpae, linux,
linux-raspi, linux-raspi-5.4, linux-image-5.4.0-1034-oracle,
linux-image-raspi-hwe-18.04, linux-oracle-5.4, linux-azure-5.4, linux-aws,
linux-azure, linux-image-generic, linux-gcp, linux-image-5.4.0-1034-aws,
linux-image-lowlatency, linux-image-lowlatency-hwe-18.04, linux-gke-5.4,
linux-image-5.4.0-1033-gcp, linux-oracle, linux-image-oracle,
linux-image-generic-lpae, linux-image-virtual, linux-image-5.4.0-1033-gke,
linux-image-azure, linux-image-5.4.0-59-generic,
linux-image-5.4.0-1031-kvm, linux-image-raspi2,
linux-image-snapdragon-hwe-18.04, linux-image-5.4.0-1026-raspi,
linux-image-raspi, linux-image-oem, linux-image-kvm,
linux-image-generic-lpae-hwe-18.04
o USN-4711-1 : linux-image-4.15.0-1064-oracle, linux-image-4.15.0-1093-aws,
linux-image-snapdragon, linux-oracle, linux-image-aws-lts-18.04,
linux-snapdragon, linux-kvm, linux-image-4.15.0-1078-raspi2,
linux-image-raspi2, linux-raspi2, linux-aws, linux-image-kvm,
linux-image-oracle-lts-18.04, linux-image-4.15.0-1084-kvm,
linux-image-4.15.0-1095-snapdragon
- --------------------------------------------------------------------------------
USN-4711-1: Linux kernel vulnerabilities
28 January 2021
Several security issues were fixed in the Linux kernel.
Releases
o Ubuntu 18.04 LTS
Packages
o linux-aws - Linux kernel for Amazon Web Services (AWS) systems
o linux-kvm - Linux kernel for cloud environments
o linux-oracle - Linux kernel for Oracle Cloud systems
o linux-raspi2 - Linux kernel for Raspberry Pi (V8) systems
o linux-snapdragon - Linux kernel for Qualcomm Snapdragon processors
Details
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. ( CVE-2020-28374 )
Kiyin () discovered that the perf subsystem in the Linux kernel did
not properly deallocate memory in some situations. A privileged attacker
could use this to cause a denial of service (kernel memory exhaustion).
( CVE-2020-25704 )
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 18.04
o linux-image-4.15.0-1064-oracle - 4.15.0-1064.71
o linux-image-4.15.0-1078-raspi2 - 4.15.0-1078.83
o linux-image-4.15.0-1084-kvm - 4.15.0-1084.86
o linux-image-4.15.0-1093-aws - 4.15.0-1093.99
o linux-image-4.15.0-1095-snapdragon - 4.15.0-1095.104
o linux-image-aws-lts-18.04 - 4.15.0.1093.96
o linux-image-kvm - 4.15.0.1084.80
o linux-image-oracle-lts-18.04 - 4.15.0.1064.74
o linux-image-raspi2 - 4.15.0.1078.75
o linux-image-snapdragon - 4.15.0.1095.98
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2020-28374
o CVE-2020-25704
Related notices
o USN-4713-1 : linux-image-5.4.0-1037-oracle, linux-raspi,
linux-image-5.8.0-1020-azure, linux-kvm, linux-gcp, linux-image-raspi,
linux-oracle, linux-image-5.4.0-1037-aws, linux-image-raspi-nolpae,
linux-image-gcp, linux-image-azure, linux-image-kvm,
linux-image-5.8.0-1021-aws, linux-image-5.4.0-1032-kvm, linux-aws,
linux-image-5.4.0-1039-azure, linux-image-5.8.0-1013-raspi,
linux-image-5.8.0-1018-oracle, linux-image-5.8.0-1013-raspi-nolpae,
linux-image-5.8.0-1016-kvm, linux-image-5.4.0-1036-gcp, linux-aws-5.4,
linux-azure, linux-image-oracle, linux-image-aws
o USN-4694-1 : linux-image-5.4.0-62-generic-lpae, linux-image-lowlatency,
linux-hwe, linux-image-4.4.0-200-powerpc-smp, linux-image-5.4.0-62-generic,
linux, linux-image-4.4.0-200-powerpc-e500mc, linux-image-generic-hwe-18.04,
linux-image-5.8.0-38-lowlatency, linux-image-generic,
linux-image-4.15.0-132-lowlatency, linux-image-4.4.0-200-generic,
linux-image-generic-hwe-20.04, linux-image-powerpc-e500mc-lts-xenial,
linux-image-powerpc64-smp, linux-image-powerpc64-emb-lts-xenial,
linux-image-powerpc64-emb, linux-hwe-5.8, linux-image-5.8.0-38-generic-64k,
linux-image-4.15.0-132-generic, linux-image-4.4.0-200-generic-lpae,
linux-image-generic-lpae-hwe-16.04, linux-image-virtual-lts-xenial,
linux-image-oem, linux-image-5.8.0-38-generic-lpae,
linux-image-5.8.0-38-generic, linux-image-generic-lpae,
linux-image-5.4.0-62-lowlatency, linux-image-powerpc64-smp-lts-xenial,
linux-image-virtual-hwe-16.04, linux-image-generic-lts-xenial,
linux-image-lowlatency-hwe-16.04, linux-image-4.4.0-200-powerpc64-emb,
linux-image-4.4.0-200-powerpc64-smp, linux-image-lowlatency-hwe-20.04,
linux-image-4.4.0-200-lowlatency, linux-image-oem-osp1,
linux-image-lowlatency-hwe-18.04, linux-image-powerpc-smp-lts-xenial,
linux-image-generic-lpae-hwe-18.04, linux-image-4.15.0-132-generic-lpae,
linux-image-generic-hwe-16.04, linux-image-generic-lpae-lts-xenial,
linux-image-virtual-hwe-20.04, linux-image-generic-lpae-hwe-20.04,
linux-image-virtual, linux-hwe-5.4, linux-image-generic-64k,
linux-image-virtual-hwe-18.04, linux-image-powerpc-smp,
linux-image-powerpc-e500mc, linux-lts-xenial,
linux-image-snapdragon-hwe-18.04, linux-image-lowlatency-lts-xenial
o USN-4710-1 : linux-image-lowlatency, linux-image-powerpc64-smp,
linux-image-powerpc64-emb, linux, linux-image-powerpc-smp,
linux-image-4.15.0-135-generic-lpae, linux-image-powerpc-e500mc,
linux-image-4.15.0-135-generic, linux-image-virtual,
linux-image-generic-lpae, linux-image-generic,
linux-image-4.15.0-135-lowlatency
o USN-4679-1 : linux-image-lowlatency, linux-image-raspi2, linux-azure-5.4,
linux, linux-oracle-5.4, linux-raspi, linux-image-generic-hwe-18.04,
linux-kvm, linux-gcp, linux-image-generic, linux-gke-5.4,
linux-image-raspi, linux-image-raspi-hwe-18.04, linux-raspi-5.4,
linux-image-5.4.0-1026-raspi, linux-image-5.4.0-59-generic-lpae,
linux-oracle, linux-image-5.4.0-1031-kvm, linux-image-gcp, linux-image-oem,
linux-image-azure, linux-image-generic-lpae, linux-image-5.4.0-1034-aws,
linux-image-kvm, linux-gcp-5.4, linux-image-5.4.0-59-generic,
linux-image-5.4.0-1033-gcp, linux-aws, linux-image-oem-osp1,
linux-image-5.4.0-1034-oracle, linux-image-lowlatency-hwe-18.04,
linux-image-generic-lpae-hwe-18.04, linux-aws-5.4, linux-image-gke-5.4,
linux-image-virtual, linux-azure, linux-hwe-5.4,
linux-image-virtual-hwe-18.04, linux-image-oracle,
linux-image-5.4.0-1035-azure, linux-image-aws, linux-image-5.4.0-1033-gke,
linux-image-snapdragon-hwe-18.04, linux-image-5.4.0-59-lowlatency
o USN-4709-1 : linux-image-snapdragon, linux-aws, linux-raspi2,
linux-image-raspi2, linux-image-4.4.0-1087-kvm,
linux-image-4.4.0-1145-raspi2, linux-image-4.4.0-1149-snapdragon,
linux-image-aws, linux-snapdragon, linux-image-4.4.0-1085-aws, linux-kvm,
linux-image-kvm
- --------------------------------------------------------------------------------
USN-4712-1: Linux kernel regression
28 January 2021
USN-4576-1 introduced a regression in the Linux kernel.
Releases
o Ubuntu 20.10
o Ubuntu 20.04 LTS
Packages
o linux - Linux kernel
Details
USN-4576-1 fixed a vulnerability in the overlay file system
implementation in the Linux kernel. Unfortunately, that fix introduced
a regression that could incorrectly deny access to overlay files in
some situations. This update fixes the problem.
We apologize for the inconvenience.
Original vulnerability details:
Giuseppe Scrivano discovered that the overlay file system in the Linux
kernel did not properly perform permission checks in some situations. A
local attacker could possibly use this to bypass intended restrictions and
gain read access to restricted files.
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.10
o linux-image-5.8.0-41-generic - 5.8.0-41.46
o linux-image-5.8.0-41-generic-64k - 5.8.0-41.46
o linux-image-5.8.0-41-generic-lpae - 5.8.0-41.46
o linux-image-5.8.0-41-lowlatency - 5.8.0-41.46
o linux-image-generic - 5.8.0.41.45
o linux-image-generic-64k - 5.8.0.41.45
o linux-image-generic-lpae - 5.8.0.41.45
o linux-image-lowlatency - 5.8.0.41.45
o linux-image-oem-20.04 - 5.8.0.41.45
o linux-image-virtual - 5.8.0.41.45
Ubuntu 20.04
o linux-image-5.4.0-65-generic - 5.4.0-65.73
o linux-image-5.4.0-65-generic-lpae - 5.4.0-65.73
o linux-image-5.4.0-65-lowlatency - 5.4.0-65.73
o linux-image-generic - 5.4.0.65.68
o linux-image-generic-lpae - 5.4.0.65.68
o linux-image-lowlatency - 5.4.0.65.68
o linux-image-oem - 5.4.0.65.68
o linux-image-oem-osp1 - 5.4.0.65.68
o linux-image-virtual - 5.4.0.65.68
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o https://bugs.launchpad.net/bugs/1900141
o https://usn.ubuntu.com/usn/usn-4576-1
- --------------------------------------------------------------------------------
USN-4713-1: Linux kernel vulnerability
28 January 2021
The system could allow unintended access to data in some environments.
Releases
o Ubuntu 20.10
o Ubuntu 20.04 LTS
o Ubuntu 18.04 LTS
Packages
o linux-aws - Linux kernel for Amazon Web Services (AWS) systems
o linux-aws-5.4 - Linux kernel for Amazon Web Services (AWS) systems
o linux-azure - Linux kernel for Microsoft Azure Cloud systems
o linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems
o linux-kvm - Linux kernel for cloud environments
o linux-oracle - Linux kernel for Oracle Cloud systems
o linux-raspi - Linux kernel for Raspberry Pi (V8) systems
Details
It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data.
Update instructions
The problem can be corrected by updating your system to the following package
versions:
Ubuntu 20.10
o linux-image-5.8.0-1013-raspi - 5.8.0-1013.16
o linux-image-5.8.0-1013-raspi-nolpae - 5.8.0-1013.16
o linux-image-5.8.0-1016-kvm - 5.8.0-1016.18
o linux-image-5.8.0-1018-oracle - 5.8.0-1018.19
o linux-image-5.8.0-1020-azure - 5.8.0-1020.22
o linux-image-5.8.0-1021-aws - 5.8.0-1021.23
o linux-image-aws - 5.8.0.1021.23
o linux-image-azure - 5.8.0.1020.20
o linux-image-kvm - 5.8.0.1016.18
o linux-image-oracle - 5.8.0.1018.18
o linux-image-raspi - 5.8.0.1013.16
o linux-image-raspi-nolpae - 5.8.0.1013.16
Ubuntu 20.04
o linux-image-5.4.0-1032-kvm - 5.4.0-1032.33
o linux-image-5.4.0-1036-gcp - 5.4.0-1036.39
o linux-image-5.4.0-1037-aws - 5.4.0-1037.39
o linux-image-5.4.0-1037-oracle - 5.4.0-1037.40
o linux-image-5.4.0-1039-azure - 5.4.0-1039.41
o linux-image-aws - 5.4.0.1037.38
o linux-image-azure - 5.4.0.1039.37
o linux-image-gcp - 5.4.0.1036.45
o linux-image-kvm - 5.4.0.1032.30
o linux-image-oracle - 5.4.0.1037.34
Ubuntu 18.04
o linux-image-5.4.0-1037-aws - 5.4.0-1037.39~18.04.1
o linux-image-aws - 5.4.0.1037.21
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.
References
o CVE-2020-28374
Related notices
o USN-4694-1 : linux-image-oem, linux-image-5.8.0-38-generic-64k,
linux-image-powerpc-e500mc-lts-xenial, linux-image-4.15.0-132-generic,
linux-image-5.4.0-62-generic, linux-image-generic-lts-xenial,
linux-image-powerpc64-smp-lts-xenial, linux-image-powerpc-e500mc,
linux-image-generic-lpae, linux-image-generic-64k,
linux-image-virtual-lts-xenial, linux-image-4.4.0-200-generic-lpae,
linux-image-5.8.0-38-generic, linux-image-4.4.0-200-generic,
linux-image-oem-osp1, linux-image-generic-hwe-16.04,
linux-image-powerpc-smp-lts-xenial, linux-image-lowlatency-hwe-20.04,
linux-image-lowlatency-hwe-18.04, linux-image-powerpc64-emb-lts-xenial,
linux-image-generic-hwe-20.04, linux-image-generic-lpae-hwe-20.04,
linux-hwe-5.8, linux-image-lowlatency-lts-xenial,
linux-image-5.8.0-38-lowlatency, linux-image-4.4.0-200-powerpc64-smp,
linux-image-5.4.0-62-generic-lpae, linux-image-generic-lpae-hwe-18.04,
linux-image-4.4.0-200-lowlatency, linux-image-4.15.0-132-lowlatency,
linux-image-5.8.0-38-generic-lpae, linux-image-4.4.0-200-powerpc-e500mc,
linux-image-5.4.0-62-lowlatency, linux-image-powerpc64-smp,
linux-lts-xenial, linux-hwe, linux-image-4.4.0-200-powerpc-smp,
linux-image-generic-lpae-lts-xenial, linux-image-generic-lpae-hwe-16.04,
linux-image-virtual-hwe-18.04, linux-image-generic-hwe-18.04,
linux-hwe-5.4, linux-image-4.15.0-132-generic-lpae,
linux-image-powerpc64-emb, linux, linux-image-virtual-hwe-16.04,
linux-image-virtual-hwe-20.04, linux-image-4.4.0-200-powerpc64-emb,
linux-image-generic, linux-image-snapdragon-hwe-18.04,
linux-image-lowlatency, linux-image-powerpc-smp,
linux-image-lowlatency-hwe-16.04, linux-image-virtual
o USN-4709-1 : linux-image-raspi2, linux-kvm, linux-raspi2, linux-image-kvm,
linux-image-4.4.0-1149-snapdragon, linux-image-4.4.0-1085-aws,
linux-image-4.4.0-1145-raspi2, linux-image-snapdragon, linux-aws,
linux-image-aws, linux-image-4.4.0-1087-kvm, linux-snapdragon
o USN-4711-1 : linux-image-4.15.0-1093-aws, linux-image-4.15.0-1084-kvm,
linux-image-aws-lts-18.04, linux-image-raspi2,
linux-image-4.15.0-1095-snapdragon, linux-image-kvm, linux-kvm,
linux-oracle, linux-raspi2, linux-image-4.15.0-1064-oracle,
linux-image-4.15.0-1078-raspi2, linux-image-oracle-lts-18.04,
linux-image-snapdragon, linux-aws, linux-snapdragon
- --------------------------END INCLUDED TEXT--------------------
You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.
NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members. As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.
NOTE: This is only the original release of the security bulletin. It may
not be updated when updates to the original are made. If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.
Contact information for the authors of the original document is included
in the Security Bulletin above. If you have any questions or need further
information, please contact them directly.
Previous advisories and external security bulletins can be retrieved from:
https://www.auscert.org.au/bulletins/
===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072
Internet Email: auscert@auscert.org.au
Facsimile: (07) 3365 7031
Telephone: (07) 3365 4417 (International: +61 7 3365 4417)
AusCERT personnel answer during Queensland business hours
which are GMT+10:00 (AEST).
On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967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=jlWH
-----END PGP SIGNATURE-----
The post ESB-2021.0326 – [Ubuntu] kernel: Multiple vulnerabilities appeared first on Malware Devil.
https://malwaredevil.com/2021/01/29/esb-2021-0326-ubuntu-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2021-0326-ubuntu-kernel-multiple-vulnerabilities
No comments:
Post a Comment