You are here
Home > Preporuke > Sigurnosni nedostaci jezgre operacijskog sustava

Sigurnosni nedostaci jezgre operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3580-1
February 22, 2018

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel

Details:

Jann Horn discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
linux-image-3.2.0-133-generic 3.2.0-133.179
linux-image-3.2.0-133-generic-pae 3.2.0-133.179
linux-image-generic 3.2.0.133.148
linux-image-generic-pae 3.2.0.133.148

Please note that fully mitigating CVE-2017-5715 (Spectre Variant 2)
requires corresponding processor microcode/firmware updates or,
in virtual environments, hypervisor updates. On i386 and amd64
architectures, the IBRS and IBPB features are required to enable the
kernel mitigations. Ubuntu is working with Intel and AMD to provide
future microcode updates that implement IBRS and IBPB as they are made
available. Ubuntu users with a processor from a different vendor should
contact the vendor to identify necessary firmware updates. Ubuntu
will provide corresponding QEMU updates in the future for users of
self-hosted virtual environments in coordination with upstream QEMU.
Ubuntu users in cloud environments should contact the cloud provider
to confirm that the hypervisor has been updated to expose the new
CPU features to virtual machines.

After a standard system update you need to reboot your computer to
apply the necessary changes.

References:
https://www.ubuntu.com/usn/usn-3580-1
https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/SpectreAndMeltdown
CVE-2017-5715, CVE-2017-5753

—–BEGIN PGP SIGNATURE—–
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=uzSV
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3581-1
February 22, 2018

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 17.10

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel

Details:

Mohamed Ghannam discovered that the IPv4 raw socket implementation in the
Linux kernel contained a race condition leading to uninitialized pointer
usage. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2017-17712)

ChunYu Wang discovered that a use-after-free vulnerability existed
in the SCTP protocol implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code, (CVE-2017-15115)

Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP
protocol implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-8824)

USN-3541-1 mitigated CVE-2017-5715 (Spectre Variant 2) for the
amd64 architecture in Ubuntu 17.10. This update provides the
compiler-based retpoline kernel mitigation for the amd64 and i386
architectures. Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
linux-image-4.13.0-36-generic 4.13.0-36.40
linux-image-4.13.0-36-generic-lpae 4.13.0-36.40
linux-image-4.13.0-36-lowlatency 4.13.0-36.40
linux-image-generic 4.13.0.36.38
linux-image-generic-lpae 4.13.0.36.38
linux-image-lowlatency 4.13.0.36.38

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3581-1
CVE-2017-15115, CVE-2017-17712, CVE-2017-5715, CVE-2017-8824

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.13.0-36.40

—–BEGIN PGP SIGNATURE—–
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=srCe
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3582-1
February 22, 2018

linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-kvm: Linux kernel for cloud environments
– linux-raspi2: Linux kernel for Raspberry Pi 2
– linux-snapdragon: Linux kernel for Snapdragon processors

Details:

Mohamed Ghannam discovered that the IPv4 raw socket implementation in the
Linux kernel contained a race condition leading to uninitialized pointer
usage. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2017-17712)

Laurent Guerby discovered that the mbcache feature in the ext2 and ext4
filesystems in the Linux kernel improperly handled xattr block caching. A
local attacker could use this to cause a denial of service. (CVE-2015-8952)

Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel
did not properly track reference counts when merging buffers. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2017-12190)

ChunYu Wang discovered that a use-after-free vulnerability existed in the
SCTP protocol implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code, (CVE-2017-15115)

Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP
protocol implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-8824)

USN-3540-1 mitigated CVE-2017-5715 (Spectre Variant 2) for the
amd64 architecture in Ubuntu 16.04 LTS. This update provides the
compiler-based retpoline kernel mitigation for the amd64 and i386
architectures. Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.4.0-1019-kvm 4.4.0-1019.24
linux-image-4.4.0-1052-aws 4.4.0-1052.61
linux-image-4.4.0-1085-raspi2 4.4.0-1085.93
linux-image-4.4.0-1087-snapdragon 4.4.0-1087.92
linux-image-4.4.0-116-generic 4.4.0-116.140
linux-image-4.4.0-116-generic-lpae 4.4.0-116.140
linux-image-4.4.0-116-lowlatency 4.4.0-116.140
linux-image-4.4.0-116-powerpc-e500mc 4.4.0-116.140
linux-image-4.4.0-116-powerpc-smp 4.4.0-116.140
linux-image-4.4.0-116-powerpc64-emb 4.4.0-116.140
linux-image-4.4.0-116-powerpc64-smp 4.4.0-116.140
linux-image-aws 4.4.0.1052.54
linux-image-generic 4.4.0.116.122
linux-image-generic-lpae 4.4.0.116.122
linux-image-kvm 4.4.0.1019.18
linux-image-lowlatency 4.4.0.116.122
linux-image-powerpc-e500mc 4.4.0.116.122
linux-image-powerpc-smp 4.4.0.116.122
linux-image-powerpc64-emb 4.4.0.116.122
linux-image-powerpc64-smp 4.4.0.116.122
linux-image-raspi2 4.4.0.1085.85
linux-image-snapdragon 4.4.0.1087.79

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3582-1
CVE-2015-8952, CVE-2017-12190, CVE-2017-15115, CVE-2017-17712,
CVE-2017-5715, CVE-2017-8824

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-116.140
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1052.61
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1019.24
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1085.93
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1087.92

—–BEGIN PGP SIGNATURE—–
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=3bDn
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3581-2
February 22, 2018

linux-hwe, linux-azure, linux-gcp, linux-oem vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-hwe: Linux hardware enablement (HWE) kernel
– linux-oem: Linux kernel for OEM processors

Details:

USN-3581-1 fixed vulnerabilities in the Linux kernel for Ubuntu 17.10.
This update provides the corresponding updates for the Linux Hardware
Enablement (HWE) kernel from Ubuntu 17.10 for Ubuntu 16.04 LTS.

Mohamed Ghannam discovered that the IPv4 raw socket implementation in the
Linux kernel contained a race condition leading to uninitialized pointer
usage. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2017-17712)

ChunYu Wang discovered that a use-after-free vulnerability existed
in the SCTP protocol implementation in the Linux kernel. A local
attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code, (CVE-2017-15115)

Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP
protocol implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-8824)

USN-3541-2 mitigated CVE-2017-5715 (Spectre Variant 2) for the
amd64 architecture in Ubuntu 16.04 LTS. This update provides the
compiler-based retpoline kernel mitigation for the amd64 and i386
architectures. Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.13.0-1011-azure 4.13.0-1011.14
linux-image-4.13.0-1011-gcp 4.13.0-1011.15
linux-image-4.13.0-1021-oem 4.13.0-1021.23
linux-image-4.13.0-36-generic 4.13.0-36.40~16.04.1
linux-image-4.13.0-36-generic-lpae 4.13.0-36.40~16.04.1
linux-image-4.13.0-36-lowlatency 4.13.0-36.40~16.04.1
linux-image-azure 4.13.0.1011.12
linux-image-gcp 4.13.0.1011.13
linux-image-generic-hwe-16.04 4.13.0.36.55
linux-image-generic-lpae-hwe-16.04 4.13.0.36.55
linux-image-gke 4.13.0.1011.13
linux-image-lowlatency-hwe-16.04 4.13.0.36.55
linux-image-oem 4.13.0.1021.25

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3581-2
https://usn.ubuntu.com/usn/usn-3581-1
CVE-2017-15115, CVE-2017-17712, CVE-2017-5715, CVE-2017-8824

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/4.13.0-1011.14
https://launchpad.net/ubuntu/+source/linux-gcp/4.13.0-1011.15
https://launchpad.net/ubuntu/+source/linux-hwe/4.13.0-36.40~16.04.1
https://launchpad.net/ubuntu/+source/linux-oem/4.13.0-1021.23

—–BEGIN PGP SIGNATURE—–
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=tdu0
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3582-2
February 22, 2018

linux-lts-xenial, linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

USN-3582-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

Mohamed Ghannam discovered that the IPv4 raw socket implementation in the
Linux kernel contained a race condition leading to uninitialized pointer
usage. A local attacker could use this to cause a denial of service or
possibly execute arbitrary code. (CVE-2017-17712)

Laurent Guerby discovered that the mbcache feature in the ext2 and ext4
filesystems in the Linux kernel improperly handled xattr block caching. A
local attacker could use this to cause a denial of service. (CVE-2015-8952)

Vitaly Mayatskikh discovered that the SCSI subsystem in the Linux kernel
did not properly track reference counts when merging buffers. A local
attacker could use this to cause a denial of service (memory exhaustion).
(CVE-2017-12190)

ChunYu Wang discovered that a use-after-free vulnerability existed in the
SCTP protocol implementation in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code, (CVE-2017-15115)

Mohamed Ghannam discovered a use-after-free vulnerability in the DCCP
protocol implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-8824)

USN-3540-2 mitigated CVE-2017-5715 (Spectre Variant 2) for the
amd64 architecture in Ubuntu 14.04 LTS. This update provides the
compiler-based retpoline kernel mitigation for the amd64 and i386
architectures. Original advisory details:

Jann Horn discovered that microprocessors utilizing speculative execution
and branch prediction may allow unauthorized memory reads via sidechannel
attacks. This flaw is known as Spectre. A local attacker could use this to
expose sensitive information, including kernel memory. (CVE-2017-5715)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-4.4.0-1014-aws 4.4.0-1014.14
linux-image-4.4.0-116-generic 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-generic-lpae 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-lowlatency 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-powerpc-e500mc 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-powerpc-smp 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-powerpc64-emb 4.4.0-116.140~14.04.1
linux-image-4.4.0-116-powerpc64-smp 4.4.0-116.140~14.04.1
linux-image-aws 4.4.0.1014.14
linux-image-generic-lpae-lts-xenial 4.4.0.116.98
linux-image-generic-lts-xenial 4.4.0.116.98
linux-image-lowlatency-lts-xenial 4.4.0.116.98
linux-image-powerpc-e500mc-lts-xenial 4.4.0.116.98
linux-image-powerpc-smp-lts-xenial 4.4.0.116.98
linux-image-powerpc64-emb-lts-xenial 4.4.0.116.98
linux-image-powerpc64-smp-lts-xenial 4.4.0.116.98

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3582-2
https://usn.ubuntu.com/usn/usn-3582-1
CVE-2015-8952, CVE-2017-12190, CVE-2017-15115, CVE-2017-17712,
CVE-2017-5715, CVE-2017-8824

Package Information:
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1014.14
https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-116.140~14.04.1

—–BEGIN PGP SIGNATURE—–

iQIcBAABCgAGBQJajpfHAAoJEC8Jno0AXoH0sI0P/22vqEufFm5TBk2GFEh/mk5X
ZDoCisepcP471PJdgLtPtXNPPv6pKEx40B0ay6rfMewc+aT4Deda+mxlnVQhqtAu
QIs1Xf5DaOKjho7xVF7VgxdcpFRqJ6K56ETeLO6by3g4LSCtqcAKr5pXc2D27lgO
D66hgIoTyjKp/AmM4dvIIhkMNuBqgd+lKwKQ6onHf+W5wq7fY017WqO+hTbPp9MV
wXpTB3ggP7Z7tV5ll1XN/0WSrrbVamP7FMDwInspm4xBw3S0YL4LwC1SkUHZXO/o
594GuzgnxQFfcDgGRTdXyUAxoPiKpw0/XFveYD3GtYllAw3kTyB3vRUSjIhtYwFX
anUduvkp8cZWRRL2s4Kd6MALaUFdjdUKYD75qbaMXHwFTTPkzAnhk2XeQHEcrd+r
BdExFfVeFM6T4O3RRROWrKmEYtLrauxZI1C4OtXNqiJBh0x6hgRq1mx6VJmj3zIS
DnTmufulSVMp+Y7LZx8tSCGe2VAXgZFp4FD7XWThryQusdBMLG+zQ3nD8mtmB1Mi
hK5zHgwK+M4YBYTbHgqOuYsbBaih416ow+z7Jk2zSHQi/Qf6UNzLyqN44SNfJAq8
SxMybjPOy06hE7XSj6Mi0wc9wTxd5dfG7KiQBkGGyMJgpONER9RmYZAjlWI9vvB6
n+41pSXD0iev4LF2+pLf
=TGCh
—–END PGP SIGNATURE—–

AutorPetar Bertok
Cert idNCERT-REF-2018-02-0172-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco Elastic Services Controller softvera

Cisco je izdao nadogradnju za otklanjanje kritične ranjivosti u Cisco Elastic Services Controller softveru. Ranjivost je posljedica neispravno podešenih sigurnosnih...

Close