You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-4284-1
February 18, 2020

linux, linux-aws, linux-azure-5.3, linux-gcp, linux-gcp-5.3, linux-hwe,
linux-kvm, linux-oracle, linux-raspi2, linux-raspi2-5.3 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 19.10
– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oracle: Linux kernel for Oracle Cloud systems
– linux-raspi2: Linux kernel for Raspberry Pi 2
– linux-azure-5.3: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp-5.3: Linux kernel for Google Cloud Platform (GCP) systems
– linux-hwe: Linux hardware enablement (HWE) kernel
– linux-raspi2-5.3: Linux kernel for Raspberry Pi 2

Details:

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly validate device metadata. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2019-15099)

It was discovered that the HSA Linux kernel driver for AMD GPU devices did
not properly check for errors in certain situations, leading to a NULL
pointer dereference. A local attacker could possibly use this to cause a
denial of service. (CVE-2019-16229)

It was discovered that the Marvell 8xxx Libertas WLAN device driver in the
Linux kernel did not properly check for errors in certain situations,
leading to a NULL pointer dereference. A local attacker could possibly use
this to cause a denial of service. (CVE-2019-16232)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the Renesas Digital Radio Interface (DRIF) driver in
the Linux kernel did not properly initialize data. A local attacker could
possibly use this to expose sensitive information (kernel memory).
(CVE-2019-18786)

It was discovered that the Sound Open Firmware (SOF) driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-18811)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19050, CVE-2019-19062)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

It was discovered that the RSI 91x WLAN device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19071)

It was discovered that the Broadcom Netxtreme HCA device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19077)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19078)

It was discovered that the AMD GPU device drivers in the Linux kernel did
not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19082)

It was discovered that the IO uring implementation in the Linux kernel did
not properly perform credentials checks in certain situations. A local
attacker could possibly use this to gain administrative privileges.
(CVE-2019-19241)

Or Cohen discovered that the virtual console subsystem in the Linux kernel
did not properly restrict writes to unimplemented vcsu (unicode) devices. A
local attacker could possibly use this to cause a denial of service (system
crash) or have other unspecified impacts. (CVE-2019-19252)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that a race condition existed in the Linux kernel on x86
platforms when keeping track of which process was assigned control of the
FPU. A local attacker could use this to cause a denial of service (memory
corruption) or possibly gain administrative privileges. (CVE-2019-19602)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle certain conditions. An attacker could use
this to specially craft an ext4 file system that, when mounted, could cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2019-19767)

It was discovered that the Kvaser CAN/USB driver in the Linux kernel did
not properly initialize memory in certain situations. A local attacker
could possibly use this to expose sensitive information (kernel memory).
(CVE-2019-19947)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.10:
linux-image-5.3.0-1009-oracle 5.3.0-1009.10
linux-image-5.3.0-1010-kvm 5.3.0-1010.11
linux-image-5.3.0-1011-aws 5.3.0-1011.12
linux-image-5.3.0-1012-gcp 5.3.0-1012.13
linux-image-5.3.0-1018-raspi2 5.3.0-1018.20
linux-image-5.3.0-40-generic 5.3.0-40.32
linux-image-5.3.0-40-generic-lpae 5.3.0-40.32
linux-image-5.3.0-40-lowlatency 5.3.0-40.32
linux-image-5.3.0-40-snapdragon 5.3.0-40.32
linux-image-aws 5.3.0.1011.13
linux-image-gcp 5.3.0.1012.13
linux-image-generic 5.3.0.40.34
linux-image-generic-lpae 5.3.0.40.34
linux-image-gke 5.3.0.1012.13
linux-image-kvm 5.3.0.1010.12
linux-image-lowlatency 5.3.0.40.34
linux-image-oracle 5.3.0.1009.10
linux-image-raspi2 5.3.0.1018.15
linux-image-snapdragon 5.3.0.40.34
linux-image-virtual 5.3.0.40.34

Ubuntu 18.04 LTS:
linux-image-5.3.0-1012-gcp 5.3.0-1012.13~18.04.1
linux-image-5.3.0-1013-azure 5.3.0-1013.14~18.04.1
linux-image-5.3.0-1018-raspi2 5.3.0-1018.20~18.04.1
linux-image-5.3.0-40-generic 5.3.0-40.32~18.04.1
linux-image-5.3.0-40-generic-lpae 5.3.0-40.32~18.04.1
linux-image-5.3.0-40-lowlatency 5.3.0-40.32~18.04.1
linux-image-azure-edge 5.3.0.1013.13
linux-image-gcp-edge 5.3.0.1012.11
linux-image-generic-hwe-18.04 5.3.0.40.97
linux-image-generic-lpae-hwe-18.04 5.3.0.40.97
linux-image-lowlatency-hwe-18.04 5.3.0.40.97
linux-image-raspi2-hwe-18.04 5.3.0.1018.7
linux-image-snapdragon-hwe-18.04 5.3.0.40.97
linux-image-virtual-hwe-18.04 5.3.0.40.97

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4284-1
CVE-2019-14615, CVE-2019-15099, CVE-2019-15291, CVE-2019-16229,
CVE-2019-16232, CVE-2019-18683, CVE-2019-18786, CVE-2019-18811,
CVE-2019-19050, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063,
CVE-2019-19071, CVE-2019-19077, CVE-2019-19078, CVE-2019-19082,
CVE-2019-19241, CVE-2019-19252, CVE-2019-19332, CVE-2019-19602,
CVE-2019-19767, CVE-2019-19947, CVE-2019-19965

Package Information:
https://launchpad.net/ubuntu/+source/linux/5.3.0-40.32
https://launchpad.net/ubuntu/+source/linux-aws/5.3.0-1011.12
https://launchpad.net/ubuntu/+source/linux-gcp/5.3.0-1012.13
https://launchpad.net/ubuntu/+source/linux-kvm/5.3.0-1010.11
https://launchpad.net/ubuntu/+source/linux-oracle/5.3.0-1009.10
https://launchpad.net/ubuntu/+source/linux-raspi2/5.3.0-1018.20
https://launchpad.net/ubuntu/+source/linux-azure-5.3/5.3.0-1013.14~18.04.1
https://launchpad.net/ubuntu/+source/linux-gcp-5.3/5.3.0-1012.13~18.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/5.3.0-40.32~18.04.1
https://launchpad.net/ubuntu/+source/linux-raspi2-5.3/5.3.0-1018.20~18.04.1

—–BEGIN PGP SIGNATURE—–

iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl5MXWsACgkQLwmejQBe
gfTvjQ//exvTrFmSoSCvjgIipj3TNgoFUcJFvqgS1Fqre8mYxKpZ7vbf6fQlsnCz
loCrZUWPSyk97QJPYcRSIH3mHibLgyyMMI6FNfmt1Y7Il4AULe53TIqRQXfEpTc5
PLFXCcXakuW842CKEjkazEryy/5euI7yWVw+OamN4UxiOqHFAHcO2rGICH18G5GS
zlae+YrTB/ODMGmHylBhPl8IhoqzHQRuGYHeBLCSF5ThvKiiXRaLt/ZACQA+Dssm
OJQeKJP9h30BMtz2QmhJXFYLzZ/8KcRJhYa5I+ou1XFjio8KmDRTvqHy78eVpqyt
Gc88kROvr3b7nYF2cVvIoT3k7tze983v67MBOIaJyxLZFyZrKvd1aporTK1Z7f7O
ib272xbJTgCxPst/DIiyiu2abFrVYvDn2tWZRMs/e1a28lkw0Hd4bK/6S9hSEJD2
ph7hnfwQmoyGnz6U5Q5LaStaMkytfFoInF/XajZM8389CPxB/afiKT9SmUomr7ze
cOgzt9oB/4XD9DyJCVGEW0eKuIB3IyKHh0PXxaTPzaMa2SFl9LH9fpUNgf3y6zZB
Q15jvtsjlWUuyNA2FyNatYlBTY9nMsrl8P+YRLgi/iwB9RxyDxHHC2oR7Rg9uYFO
zaBhoYW3hPdOqTnVqicqSX91jqsBhsq0NjxquFB5OpX9duC/fJ4=
=XY1h
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4285-1
February 18, 2020

linux-aws-5.0, linux-azure, linux-gcp, linux-gke-5.0, linux-oracle-5.0
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-aws-5.0: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-gke-5.0: Linux kernel for Google Container Engine (GKE) systems
– linux-oracle-5.0: Linux kernel for Oracle Cloud systems

Details:

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that the HSA Linux kernel driver for AMD GPU devices did
not properly check for errors in certain situations, leading to a NULL
pointer dereference. A local attacker could possibly use this to cause a
denial of service. (CVE-2019-16229)

It was discovered that the Marvell 8xxx Libertas WLAN device driver in the
Linux kernel did not properly check for errors in certain situations,
leading to a NULL pointer dereference. A local attacker could possibly use
this to cause a denial of service. (CVE-2019-16232)

It was discovered that the Renesas Digital Radio Interface (DRIF) driver in
the Linux kernel did not properly initialize data. A local attacker could
possibly use this to expose sensitive information (kernel memory)
(CVE-2019-18786).

It was discovered that the Afatech AF9005 DVB-T USB device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-18809)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

It was discovered that the Kvaser CAN/USB driver in the Linux kernel did
not properly initialize memory in certain situations. A local attacker
could possibly use this to expose sensitive information (kernel memory).
(CVE-2019-19947)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that a race condition can lead to a use-after-free while
destroying GEM contexts in the i915 driver for the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-7053)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-5.0.0-1011-oracle 5.0.0-1011.16
linux-image-5.0.0-1025-aws 5.0.0-1025.28
linux-image-5.0.0-1030-gke 5.0.0-1030.31
linux-image-5.0.0-1031-gcp 5.0.0-1031.32
linux-image-5.0.0-1032-azure 5.0.0-1032.34
linux-image-azure 5.0.0.1032.43
linux-image-gcp 5.0.0.1031.35
linux-image-gke-5.0 5.0.0.1030.18

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4285-1
CVE-2019-14615, CVE-2019-16229, CVE-2019-16232, CVE-2019-18786,
CVE-2019-18809, CVE-2019-19057, CVE-2019-19063, CVE-2019-19947,
CVE-2019-19965, CVE-2019-20096, CVE-2019-5108, CVE-2020-7053

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws-5.0/5.0.0-1025.28
https://launchpad.net/ubuntu/+source/linux-azure/5.0.0-1032.34
https://launchpad.net/ubuntu/+source/linux-gcp/5.0.0-1031.32
https://launchpad.net/ubuntu/+source/linux-gke-5.0/5.0.0-1030.31
https://launchpad.net/ubuntu/+source/linux-oracle-5.0/5.0.0-1011.16

—–BEGIN PGP SIGNATURE—–

iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl5MXYIACgkQLwmejQBe
gfSuAA//WbXeFBteqDXkKZnSU6aKtKvAuS69Cll/YZvChH87sijL1NzN0/Vr9JCV
44ugRGBqN/5oxbmGslaUJROHfKMI/VbPMrJWpdegc+jkuIpngzVnvTQnc1z2UM1B
kFWbxU3VRZP5ACYXMJf/Wz6ACZ1FxnMB3pLRJ1dC5RMf7Ht/Hmfooyybq/9dTpC1
ogW8qPj6/n0b51wS81lYdD6mV7UjxiypR4Bfj+FZO0Ckzg+7x1kBy/IHND8DAoge
p0f6xjoyRK1hp9dLrzvVyCD35evZJ1CEDJ0saGXDPAMuO4/zkxnbkVXtAMcnFol8
dO2B9WuHTqjcKp+PeZA9qf4+5bMaU3xgB6Ip/EXOvzhassMANkm6o1tbQfyIjFDH
8U7SVVbkRU/J+cHzKr6EJev1hRd4crc+HR0LxI/FxBGVjbfwLDvErDGR04+PxBcG
n+Zg8tKGjqBno4fJeP4lCHrVNoqf0H32yVXN5rpMAF0XQgoDY/5rYBK0AV+dbiae
JhTiWY3P8iSXyasJDyEQONO90ZQCU5oJNoddR/7cyykbTIopWebr3hvU+axE+MfP
mWeoGuVuvCmJZt/H1BUWl2zrTXxpQqWOFJzRtPZ9J9oiC6Iw88O2l+6W8nNvt6Sc
2y51yTZ9zPHf3y4WzuIUNnInMEugsC1h+UgmcaBB6Z83dUFjSUQ=
=V6sW
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4286-1
February 18, 2020

linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-kvm: Linux kernel for cloud environments
– linux-raspi2: Linux kernel for Raspberry Pi 2
– linux-snapdragon: Linux kernel for Snapdragon processors

Details:

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a race condition existed in the Softmac USB Prism54
device driver in the Linux kernel. A physically proximate attacker could
use this to cause a denial of service (system crash). (CVE-2019-15220)

Julien Grall discovered that the Xen balloon memory driver in the Linux
kernel did not properly restrict the amount of memory set aside for page
mappings in some situations. An attacker could use this to cause a denial
of service (kernel memory exhaustion). (CVE-2019-17351)

It was discovered that the Intel WiMAX 2400 driver in the Linux kernel did
not properly deallocate memory in certain situations. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19051)

It was discovered that the Marvell Wi-Fi device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19056)

It was discovered that the Brocade BFA Fibre Channel device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19066)

It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19068)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that ZR364XX Camera USB device driver for the Linux
kernel did not properly initialize memory. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2019-15217)

It was discovered that the Line 6 POD USB device driver in the Linux kernel
did not properly validate data size information from the device. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2019-15221)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.4.0-1066-kvm 4.4.0-1066.73
linux-image-4.4.0-1102-aws 4.4.0-1102.113
linux-image-4.4.0-1129-raspi2 4.4.0-1129.138
linux-image-4.4.0-1133-snapdragon 4.4.0-1133.141
linux-image-4.4.0-174-generic 4.4.0-174.204
linux-image-4.4.0-174-generic-lpae 4.4.0-174.204
linux-image-4.4.0-174-lowlatency 4.4.0-174.204
linux-image-4.4.0-174-powerpc-e500mc 4.4.0-174.204
linux-image-4.4.0-174-powerpc-smp 4.4.0-174.204
linux-image-4.4.0-174-powerpc64-emb 4.4.0-174.204
linux-image-4.4.0-174-powerpc64-smp 4.4.0-174.204
linux-image-aws 4.4.0.1102.106
linux-image-generic 4.4.0.174.182
linux-image-generic-lpae 4.4.0.174.182
linux-image-kvm 4.4.0.1066.66
linux-image-lowlatency 4.4.0.174.182
linux-image-powerpc-e500mc 4.4.0.174.182
linux-image-powerpc-smp 4.4.0.174.182
linux-image-powerpc64-emb 4.4.0.174.182
linux-image-powerpc64-smp 4.4.0.174.182
linux-image-raspi2 4.4.0.1129.129
linux-image-snapdragon 4.4.0.1133.125
linux-image-virtual 4.4.0.174.182

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4286-1
CVE-2019-14615, CVE-2019-15217, CVE-2019-15220, CVE-2019-15221,
CVE-2019-17351, CVE-2019-19051, CVE-2019-19056, CVE-2019-19066,
CVE-2019-19068, CVE-2019-19965, CVE-2019-20096, CVE-2019-5108

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-174.204
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1102.113
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1066.73
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1129.138
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1133.141

—–BEGIN PGP SIGNATURE—–
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=GMxn
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4287-1
February 18, 2020

linux, linux-aws, linux-aws-hwe, linux-azure, linux-gcp, linux-gke-4.15,
linux-hwe, linux-kvm, linux-oracle, linux-raspi2, linux-snapdragon
vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-gke-4.15: Linux kernel for Google Container Engine (GKE) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oracle: Linux kernel for Oracle Cloud systems
– linux-raspi2: Linux kernel for Raspberry Pi 2
– linux-snapdragon: Linux kernel for Snapdragon processors
– linux-aws-hwe: Linux kernel for Amazon Web Services (AWS-HWE) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-hwe: Linux hardware enablement (HWE) kernel

Details:

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly validate device metadata. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2019-15099)

It was discovered that the HSA Linux kernel driver for AMD GPU devices did
not properly check for errors in certain situations, leading to a NULL
pointer dereference. A local attacker could possibly use this to cause a
denial of service. (CVE-2019-16229)

It was discovered that the Marvell 8xxx Libertas WLAN device driver in the
Linux kernel did not properly check for errors in certain situations,
leading to a NULL pointer dereference. A local attacker could possibly use
this to cause a denial of service. (CVE-2019-16232)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the Renesas Digital Radio Interface (DRIF) driver in
the Linux kernel did not properly initialize data. A local attacker could
possibly use this to expose sensitive information (kernel memory).
(CVE-2019-18786)

It was discovered that the Afatech AF9005 DVB-T USB device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-18809)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19062)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

It was discovered that the RSI 91x WLAN device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19071)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19078)

It was discovered that the AMD GPU device drivers in the Linux kernel did
not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19082)

Dan Carpenter discovered that the AppleTalk networking subsystem of the
Linux kernel did not properly handle certain error conditions, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service (system crash). (CVE-2019-19227)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle certain conditions. An attacker could use
this to specially craft an ext4 file system that, when mounted, could cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2019-19767)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that a race condition can lead to a use-after-free while
destroying GEM contexts in the i915 driver for the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-7053)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-4.15.0-1033-oracle 4.15.0-1033.36
linux-image-4.15.0-1052-gke 4.15.0-1052.55
linux-image-4.15.0-1053-kvm 4.15.0-1053.53
linux-image-4.15.0-1055-raspi2 4.15.0-1055.59
linux-image-4.15.0-1060-aws 4.15.0-1060.62
linux-image-4.15.0-1072-snapdragon 4.15.0-1072.79
linux-image-4.15.0-88-generic 4.15.0-88.88
linux-image-4.15.0-88-generic-lpae 4.15.0-88.88
linux-image-4.15.0-88-lowlatency 4.15.0-88.88
linux-image-aws 4.15.0.1060.61
linux-image-aws-lts-18.04 4.15.0.1060.61
linux-image-generic 4.15.0.88.80
linux-image-generic-lpae 4.15.0.88.80
linux-image-gke 4.15.0.1052.56
linux-image-gke-4.15 4.15.0.1052.56
linux-image-kvm 4.15.0.1053.53
linux-image-lowlatency 4.15.0.88.80
linux-image-oracle 4.15.0.1033.38
linux-image-oracle-lts-18.04 4.15.0.1033.38
linux-image-powerpc-e500mc 4.15.0.88.80
linux-image-powerpc-smp 4.15.0.88.80
linux-image-powerpc64-emb 4.15.0.88.80
linux-image-powerpc64-smp 4.15.0.88.80
linux-image-raspi2 4.15.0.1055.53
linux-image-snapdragon 4.15.0.1072.75
linux-image-virtual 4.15.0.88.80

Ubuntu 16.04 LTS:
linux-image-4.15.0-1033-oracle 4.15.0-1033.36~16.04.1
linux-image-4.15.0-1055-gcp 4.15.0-1055.59
linux-image-4.15.0-1060-aws 4.15.0-1060.62~16.04.1
linux-image-4.15.0-1071-azure 4.15.0-1071.76
linux-image-4.15.0-88-generic 4.15.0-88.88~16.04.1
linux-image-4.15.0-88-generic-lpae 4.15.0-88.88~16.04.1
linux-image-4.15.0-88-lowlatency 4.15.0-88.88~16.04.1
linux-image-aws-hwe 4.15.0.1060.60
linux-image-azure 4.15.0.1071.74
linux-image-gcp 4.15.0.1055.69
linux-image-generic-hwe-16.04 4.15.0.88.98
linux-image-generic-lpae-hwe-16.04 4.15.0.88.98
linux-image-gke 4.15.0.1055.69
linux-image-lowlatency-hwe-16.04 4.15.0.88.98
linux-image-oem 4.15.0.88.98
linux-image-oracle 4.15.0.1033.26
linux-image-virtual-hwe-16.04 4.15.0.88.98

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4287-1
CVE-2019-14615, CVE-2019-15099, CVE-2019-15291, CVE-2019-16229,
CVE-2019-16232, CVE-2019-18683, CVE-2019-18786, CVE-2019-18809,
CVE-2019-18885, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063,
CVE-2019-19071, CVE-2019-19078, CVE-2019-19082, CVE-2019-19227,
CVE-2019-19332, CVE-2019-19767, CVE-2019-19965, CVE-2019-20096,
CVE-2019-5108, CVE-2020-7053

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.15.0-88.88
https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1060.62
https://launchpad.net/ubuntu/+source/linux-gke-4.15/4.15.0-1052.55
https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1053.53
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1033.36
https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1055.59
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.15.0-1072.79
https://launchpad.net/ubuntu/+source/linux-aws-hwe/4.15.0-1060.62~16.04.1
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1071.76
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1055.59
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-88.88~16.04.1
https://launchpad.net/ubuntu/+source/linux-oracle/4.15.0-1033.36~16.04.1

—–BEGIN PGP SIGNATURE—–
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=j9iN
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4287-2
February 18, 2020

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

USN-4287-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04
LTS. This update provides the corresponding updates for the Linux
kernel for Microsoft Azure Cloud systems for Ubuntu 14.04 ESM.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly validate device metadata. A physically
proximate attacker could use this to cause a denial of service (system
crash). (CVE-2019-15099)

It was discovered that the HSA Linux kernel driver for AMD GPU devices did
not properly check for errors in certain situations, leading to a NULL
pointer dereference. A local attacker could possibly use this to cause a
denial of service. (CVE-2019-16229)

It was discovered that the Marvell 8xxx Libertas WLAN device driver in the
Linux kernel did not properly check for errors in certain situations,
leading to a NULL pointer dereference. A local attacker could possibly use
this to cause a denial of service. (CVE-2019-16232)

It was discovered that a race condition existed in the Virtual Video Test
Driver in the Linux kernel. An attacker with write access to /dev/video0 on
a system with the vivid module loaded could possibly use this to gain
administrative privileges. (CVE-2019-18683)

It was discovered that the Renesas Digital Radio Interface (DRIF) driver in
the Linux kernel did not properly initialize data. A local attacker could
possibly use this to expose sensitive information (kernel memory).
(CVE-2019-18786)

It was discovered that the Afatech AF9005 DVB-T USB device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-18809)

It was discovered that the btrfs file system in the Linux kernel did not
properly validate metadata, leading to a NULL pointer dereference. An
attacker could use this to specially craft a file system image that, when
mounted, could cause a denial of service (system crash). (CVE-2019-18885)

It was discovered that multiple memory leaks existed in the Marvell WiFi-Ex
Driver for the Linux kernel. A local attacker could possibly use this to
cause a denial of service (kernel memory exhaustion). (CVE-2019-19057)

It was discovered that the crypto subsystem in the Linux kernel did not
properly deallocate memory in certain error conditions. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19062)

It was discovered that the Realtek rtlwifi USB device driver in the Linux
kernel did not properly deallocate memory in certain error conditions. A
local attacker could possibly use this to cause a denial of service (kernel
memory exhaustion). (CVE-2019-19063)

It was discovered that the RSI 91x WLAN device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to cause a denial of service (kernel memory
exhaustion). (CVE-2019-19071)

It was discovered that the Atheros 802.11ac wireless USB device driver in
the Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19078)

It was discovered that the AMD GPU device drivers in the Linux kernel did
not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19082)

Dan Carpenter discovered that the AppleTalk networking subsystem of the
Linux kernel did not properly handle certain error conditions, leading to a
NULL pointer dereference. A local attacker could use this to cause a denial
of service (system crash). (CVE-2019-19227)

It was discovered that the KVM hypervisor implementation in the Linux
kernel did not properly handle ioctl requests to get emulated CPUID
features. An attacker with access to /dev/kvm could use this to cause a
denial of service (system crash). (CVE-2019-19332)

It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle certain conditions. An attacker could use
this to specially craft an ext4 file system that, when mounted, could cause
a denial of service (system crash) or possibly execute arbitrary code.
(CVE-2019-19767)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that a race condition can lead to a use-after-free while
destroying GEM contexts in the i915 driver for the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-7053)

It was discovered that the B2C2 FlexCop USB device driver in the Linux
kernel did not properly validate device metadata. A physically proximate
attacker could use this to cause a denial of service (system crash).
(CVE-2019-15291)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
linux-image-4.15.0-1069-azure 4.15.0-1069.74~14.04.1
linux-image-azure 4.15.0.1069.55

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4287-2
https://usn.ubuntu.com/4287-1
CVE-2019-14615, CVE-2019-15099, CVE-2019-15291, CVE-2019-16229,
CVE-2019-16232, CVE-2019-18683, CVE-2019-18786, CVE-2019-18809,
CVE-2019-18885, CVE-2019-19057, CVE-2019-19062, CVE-2019-19063,
CVE-2019-19071, CVE-2019-19078, CVE-2019-19082, CVE-2019-19227,
CVE-2019-19332, CVE-2019-19767, CVE-2019-19965, CVE-2019-20096,
CVE-2019-5108, CVE-2020-7053

—–BEGIN PGP SIGNATURE—–
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=LKD1
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-4286-2
February 18, 2020

linux-lts-xenial, linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

USN-4286-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 ESM.

It was discovered that the Linux kernel did not properly clear data
structures on context switches for certain Intel graphics processors. A
local attacker could use this to expose sensitive information.
(CVE-2019-14615)

It was discovered that a race condition existed in the Softmac USB Prism54
device driver in the Linux kernel. A physically proximate attacker could
use this to cause a denial of service (system crash). (CVE-2019-15220)

Julien Grall discovered that the Xen balloon memory driver in the Linux
kernel did not properly restrict the amount of memory set aside for page
mappings in some situations. An attacker could use this to cause a denial
of service (kernel memory exhaustion). (CVE-2019-17351)

It was discovered that the Intel WiMAX 2400 driver in the Linux kernel did
not properly deallocate memory in certain situations. A local attacker
could use this to cause a denial of service (kernel memory exhaustion).
(CVE-2019-19051)

It was discovered that the Marvell Wi-Fi device driver in the Linux kernel
did not properly deallocate memory in certain error conditions. A local
attacker could use this to possibly cause a denial of service (kernel
memory exhaustion). (CVE-2019-19056)

It was discovered that the Brocade BFA Fibre Channel device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19066)

It was discovered that the Realtek RTL8xxx USB Wi-Fi device driver in the
Linux kernel did not properly deallocate memory in certain error
conditions. A local attacker could possibly use this to cause a denial of
service (kernel memory exhaustion). (CVE-2019-19068)

Gao Chuan discovered that the SAS Class driver in the Linux kernel
contained a race condition that could lead to a NULL pointer dereference. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-19965)

It was discovered that the Datagram Congestion Control Protocol (DCCP)
implementation in the Linux kernel did not properly deallocate memory in
certain error conditions. An attacker could possibly use this to cause a
denial of service (kernel memory exhaustion). (CVE-2019-20096)

Mitchell Frank discovered that the Wi-Fi implementation in the Linux kernel
when used as an access point would send IAPP location updates for stations
before client authentication had completed. A physically proximate attacker
could use this to cause a denial of service. (CVE-2019-5108)

It was discovered that ZR364XX Camera USB device driver for the Linux
kernel did not properly initialize memory. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2019-15217)

It was discovered that the Line 6 POD USB device driver in the Linux kernel
did not properly validate data size information from the device. A
physically proximate attacker could use this to cause a denial of service
(system crash). (CVE-2019-15221)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 ESM:
linux-image-4.4.0-1062-aws 4.4.0-1062.66
linux-image-4.4.0-174-generic 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-generic-lpae 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-lowlatency 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-powerpc-e500mc 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-powerpc-smp 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-powerpc64-emb 4.4.0-174.204~14.04.1
linux-image-4.4.0-174-powerpc64-smp 4.4.0-174.204~14.04.1
linux-image-aws 4.4.0.1062.63
linux-image-generic-lpae-lts-xenial 4.4.0.174.153
linux-image-generic-lts-xenial 4.4.0.174.153
linux-image-lowlatency-lts-xenial 4.4.0.174.153
linux-image-powerpc-e500mc-lts-xenial 4.4.0.174.153
linux-image-powerpc-smp-lts-xenial 4.4.0.174.153
linux-image-powerpc64-emb-lts-xenial 4.4.0.174.153
linux-image-powerpc64-smp-lts-xenial 4.4.0.174.153
linux-image-virtual-lts-xenial 4.4.0.174.153

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/4286-2
https://usn.ubuntu.com/4286-1
CVE-2019-14615, CVE-2019-15217, CVE-2019-15220, CVE-2019-15221,
CVE-2019-17351, CVE-2019-19051, CVE-2019-19056, CVE-2019-19066,
CVE-2019-19068, CVE-2019-19965, CVE-2019-20096, CVE-2019-5108

—–BEGIN PGP SIGNATURE—–

iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAl5MXgwACgkQLwmejQBe
gfSqUw/+NPEYfdojH5RQSDrITh7gwxnjyMIo/2AbGGe9V5lltS7l/wAd8ca/4e/T
8e/Dtv4++bw0HYwKd1gfigGyoTz3Ushx8+EERW8CdHLV8arEMLk5stRMaJql9M3z
FezPG1fDQrV4NhyZmHIiu4NXQMkdzmfsB7wqPpmyjXsm9hKrKYtZjGMPBNSNArp4
ZKFhnvSpYYZes/3EvndHnN8P7E4BI3sWYvx+7AneZGTX//q3PFBoQXFMYyKPEUbd
BI3LRMD9D/Do8VlWLWjl6BLBICcDErfJuNmIgXKxHQR71Jbj1wYCtjF1+tXLa2e/
OSmrv5PL0JebGnRHbtyBZsXmo8Gy2+nz2MCGgzVSzLLy2x8JYQ+uMJZ0kDbc6Yhq
bb6RkVtK4FB7smNGG8FoRQGrHjoJRR6aaZUzSYhhBAzz9+pgT5WcQZpJDVsXWCG3
4Xdl4zdpX1Jrjnd0xvGTCfVX834JvXl7S3/OfV3pOw12phmod/yiFy+GkGO8fcCK
W0PEVAloL5Dsa89Ol9PJ7pJwAL0+1ppx8liNmTLBdpKHNfiJ//bsGiJF2FRfLoaP
kgf8WtGn0400NFldSvgfel1TKTQ2PaziiUDYaX/0TWzK+52j+Jgh6GCtFEv6/BTQ
s2CwZmJUv/5C1v4hPgNqqnkq8zghCk+Bzm2ROr4MkZvXLoEpJME=
=6q5i
—–END PGP SIGNATURE—–

AutorJosip Papratovic
Cert idNCERT-REF-2020-02-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja, izvršavanje proizvoljnog programskog koda...

Close