You are here
Home > Preporuke > Sigurnosni nedostatak jezgre operacijskog sustava

Sigurnosni nedostatak jezgre operacijskog sustava

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-3732-1
August 06, 2018

linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem,
linux-raspi2 vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS

Summary:

The system could be made unavailable if it received specially crafted
network traffic.

Software Description:
– linux: Linux kernel
– linux-aws: Linux kernel for Amazon Web Services (AWS) systems
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-kvm: Linux kernel for cloud environments
– linux-oem: Linux kernel for OEM processors
– linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel
performed algorithmically expensive operations in some situations when
handling incoming packets. A remote attacker could use this to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
linux-image-4.15.0-1013-oem 4.15.0-1013.16
linux-image-4.15.0-1015-gcp 4.15.0-1015.15
linux-image-4.15.0-1017-aws 4.15.0-1017.17
linux-image-4.15.0-1017-kvm 4.15.0-1017.17
linux-image-4.15.0-1018-raspi2 4.15.0-1018.19
linux-image-4.15.0-1019-azure 4.15.0-1019.19
linux-image-4.15.0-30-generic 4.15.0-30.32
linux-image-4.15.0-30-generic-lpae 4.15.0-30.32
linux-image-4.15.0-30-lowlatency 4.15.0-30.32
linux-image-4.15.0-30-snapdragon 4.15.0-30.32
linux-image-aws 4.15.0.1017.17
linux-image-azure 4.15.0.1019.19
linux-image-azure-edge 4.15.0.1019.19
linux-image-gcp 4.15.0.1015.17
linux-image-generic 4.15.0.30.32
linux-image-generic-lpae 4.15.0.30.32
linux-image-gke 4.15.0.1015.17
linux-image-kvm 4.15.0.1017.17
linux-image-lowlatency 4.15.0.30.32
linux-image-oem 4.15.0.1013.15
linux-image-raspi2 4.15.0.1018.16
linux-image-snapdragon 4.15.0.30.32

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3732-1
CVE-2018-5390

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.15.0-30.32
https://launchpad.net/ubuntu/+source/linux-aws/4.15.0-1017.17
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15
https://launchpad.net/ubuntu/+source/linux-kvm/4.15.0-1017.17
https://launchpad.net/ubuntu/+source/linux-oem/4.15.0-1013.16
https://launchpad.net/ubuntu/+source/linux-raspi2/4.15.0-1018.19

—–BEGIN PGP SIGNATURE—–
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=OTJp
—–END PGP SIGNATURE—–

ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

==========================================================================
Ubuntu Security Notice USN-3732-2
August 06, 2018

linux-hwe, linux-azure, linux-gcp vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 16.04 LTS

Summary:

The system could be made unavailable if it received specially crafted
network traffic.

Software Description:
– linux-azure: Linux kernel for Microsoft Azure Cloud systems
– linux-gcp: Linux kernel for Google Cloud Platform (GCP) systems
– linux-hwe: Linux hardware enablement (HWE) kernel

Details:

USN-3732-1 fixed vulnerabilities in the Linux kernel for Ubuntu 18.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 18.04 LTS for Ubuntu
16.04 LTS.

Juha-Matti Tilli discovered that the TCP implementation in the Linux kernel
performed algorithmically expensive operations in some situations when
handling incoming packets. A remote attacker could use this to cause a
denial of service.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
linux-image-4.15.0-1015-gcp 4.15.0-1015.15~16.04.1
linux-image-4.15.0-1019-azure 4.15.0-1019.19~16.04.1
linux-image-4.15.0-30-generic 4.15.0-30.32~16.04.1
linux-image-4.15.0-30-generic-lpae 4.15.0-30.32~16.04.1
linux-image-4.15.0-30-lowlatency 4.15.0-30.32~16.04.1
linux-image-azure 4.15.0.1019.25
linux-image-gcp 4.15.0.1015.27
linux-image-generic-hwe-16.04 4.15.0.30.52
linux-image-generic-lpae-hwe-16.04 4.15.0.30.52
linux-image-gke 4.15.0.1015.27
linux-image-lowlatency-hwe-16.04 4.15.0.30.52

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3732-2
https://usn.ubuntu.com/usn/usn-3732-1
CVE-2018-5390

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1019.19~16.04.1
https://launchpad.net/ubuntu/+source/linux-gcp/4.15.0-1015.15~16.04.1
https://launchpad.net/ubuntu/+source/linux-hwe/4.15.0-30.32~16.04.1

—–BEGIN PGP SIGNATURE—–

iQIzBAABCgAdFiEEpgY7tWAjCaQ8jrvULwmejQBegfQFAltoxMkACgkQLwmejQBe
gfSNmQ//WQA1eyR22LHBw8xw6goC+KqiusZGVHc3GAJ5jgGiax0eIa636h+HLQ6g
2WMjlJE2wuSz063fJMugqrYYCVn/GJTNhekpUUapqRFExmCUQht9UOiXQug93K2d
LOYk6LCYU2qaXDdcIxd99MCSTNoDvjudDzAm4f38Kmqd4B08q8+tyc7n6pAgdO8T
m1gWb48A9cmC9uzs6gFx3upImktAkbdI4EmGTHr3H2HaYU4xbsSkKtCaz3p+67JX
GUfZei2PDv2uBzBFMJx3bH8lbDCtgpm6dWuVV2jfGz8Jbn2S+ZUsZbms1PpehvFT
p3kwEnmGY177l0H4EQ/UeaNQ0AmShdmUcf6IghoAnGO7K8dcsq0b6wS8ETEmWkkZ
34Vi8o5OwP7uBegJzEEvKTzy6VLN08RLlwL4L4G7SoJ435PpqCeplKtDR3e1dcG1
uP1dDCBDKxVlEqUDhdz119kDDTz0RmRyIN/kg/OGk4BbxEx5clHuz0FNOqP+IkFJ
B11t+tERd+zSodNZloPi9zLxdJZoCejgVdbi2u547l8mq6FGTRxHnadYnmFOOtdL
yO3qma3Uo1LK/DrQaS/5qEzWuVKGpzmHIDf7I+llX34WhnbfGwr37FELggc8d1sg
N6OMA6xsiTb8ECxfdVJBVWhmF9nWY1x+qq0deyWnUudjaja1iC8=
=mzxo
—–END PGP SIGNATURE—–

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-08-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci jezgre operacijskog sustava Debian. Otkriveni nedostaci potencijalnim napadačima omogućuju izazivanje DoS stanja ili stjecanje uvećanih ovlasti....

Close