ESB-2017.3143.2 - UPDATE [Ubuntu] Kernel: Multiple vulnerabilities 2017-12-18

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                              ESB-2017.3143.2
                       Linux kernel vulnerabilities
                             18 December 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Kernel
Publisher:         Ubuntu
Operating System:  Ubuntu
Impact/Access:     Root Compromise   -- Existing Account
                   Denial of Service -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-1000405 CVE-2017-16939 CVE-2017-16643
                   CVE-2017-16535 CVE-2017-15951 CVE-2017-15306
                   CVE-2017-15299 CVE-2017-12193 CVE-2017-12146

Reference:         ESB-2017.3129
                   ESB-2017.3104

Original Bulletin: 
   http://www.ubuntu.com/usn/usn-3507-1
   http://www.ubuntu.com/usn/usn-3508-1
   http://www.ubuntu.com/usn/usn-3509-1
   http://www.ubuntu.com/usn/usn-3509-2
   http://www.ubuntu.com/usn/usn-3510-1
   http://www.ubuntu.com/usn/usn-3510-2
   http://www.ubuntu.com/usn/usn-3509-3
   http://www.ubuntu.com/usn/usn-3509-4

Comment: This bulletin contains eight (8) Ubuntu security advisories.

Revision History:  December 18 2017: Regression patched which broke Ceph network filesystem in 14.04 LTS and 16.04 LTS
                   December  8 2017: Initial Release

- --------------------------BEGIN INCLUDED TEXT--------------------

==========================================================================
Ubuntu Security Notice USN-3507-1
December 07, 2017

linux, linux-raspi2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 17.10

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux: Linux kernel
- - linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
implementation in the Linux kernel sometimes did not properly handle adding
a new entry. A local attacker could use this to cause a denial of service
(system crash). (CVE-2017-12193)

Eric Biggers discovered that the key management subsystem in the Linux
kernel did not properly restrict adding a key that already exists but is
uninstantiated. A local attacker could use this to cause a denial of
service (system crash) or possibly execute arbitrary code. (CVE-2017-15299)

It was discovered that a null pointer dereference error existed in the
PowerPC KVM implementation in the Linux kernel. A local attacker could use
this to cause a denial of service (system crash). (CVE-2017-15306)

Eric Biggers discovered a race condition in the key management subsystem of
the Linux kernel around keys in a negative state. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-15951)

Andrey Konovalov discovered that the USB subsystem in the Linux kernel did
not properly validate USB BOS metadata. A physically proximate attacker
could use this to cause a denial of service (system crash).
(CVE-2017-16535)

Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
driver for the Linux kernel. A physically proximate attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16643)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.10:
  linux-image-4.13.0-1008-raspi2  4.13.0-1008.8
  linux-image-4.13.0-19-generic   4.13.0-19.22
  linux-image-4.13.0-19-generic-lpae  4.13.0-19.22
  linux-image-4.13.0-19-lowlatency  4.13.0-19.22
  linux-image-generic             4.13.0.19.20
  linux-image-generic-lpae        4.13.0.19.20
  linux-image-lowlatency          4.13.0.19.20
  linux-image-raspi2              4.13.0.1008.6

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3507-1
  CVE-2017-1000405, CVE-2017-12193, CVE-2017-15299, CVE-2017-15306,
  CVE-2017-15951, CVE-2017-16535, CVE-2017-16643, CVE-2017-16939

Package Information:
  https://launchpad.net/ubuntu/+source/linux/4.13.0-19.22
  https://launchpad.net/ubuntu/+source/linux-raspi2/4.13.0-1008.8


- ---------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3508-1
December 07, 2017

linux, linux-raspi2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 17.04

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux: Linux kernel
- - linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Yonggang Guo discovered that a race condition existed in the driver
subsystem in the Linux kernel. A local attacker could use this to possibly
gain administrative privileges. (CVE-2017-12146)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 17.04:
  linux-image-4.10.0-1023-raspi2  4.10.0-1023.26
  linux-image-4.10.0-42-generic   4.10.0-42.46
  linux-image-4.10.0-42-generic-lpae  4.10.0-42.46
  linux-image-4.10.0-42-lowlatency  4.10.0-42.46
  linux-image-generic             4.10.0.42.42
  linux-image-generic-lpae        4.10.0.42.42
  linux-image-lowlatency          4.10.0.42.42
  linux-image-raspi2              4.10.0.1023.24

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3508-1
  CVE-2017-1000405, CVE-2017-12146, CVE-2017-16939

Package Information:
  https://launchpad.net/ubuntu/+source/linux/4.10.0-42.46
  https://launchpad.net/ubuntu/+source/linux-raspi2/4.10.0-1023.26

- ------------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3509-1
December 07, 2017

linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux: Linux kernel
- - linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- - linux-kvm: Linux kernel for cloud environments
- - linux-raspi2: Linux kernel for Raspberry Pi 2
- - linux-snapdragon: Linux kernel for Snapdragon processors

Details:

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
implementation in the Linux kernel sometimes did not properly handle adding
a new entry. A local attacker could use this to cause a denial of service
(system crash). (CVE-2017-12193)

Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
driver for the Linux kernel. A physically proximate attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16643)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
  linux-image-4.4.0-1012-kvm      4.4.0-1012.17
  linux-image-4.4.0-103-generic   4.4.0-103.126
  linux-image-4.4.0-103-generic-lpae  4.4.0-103.126
  linux-image-4.4.0-103-lowlatency  4.4.0-103.126
  linux-image-4.4.0-103-powerpc-e500mc  4.4.0-103.126
  linux-image-4.4.0-103-powerpc-smp  4.4.0-103.126
  linux-image-4.4.0-103-powerpc64-emb  4.4.0-103.126
  linux-image-4.4.0-103-powerpc64-smp  4.4.0-103.126
  linux-image-4.4.0-1043-aws      4.4.0-1043.52
  linux-image-4.4.0-1079-raspi2   4.4.0-1079.87
  linux-image-4.4.0-1081-snapdragon  4.4.0-1081.86
  linux-image-aws                 4.4.0.1043.45
  linux-image-generic             4.4.0.103.108
  linux-image-generic-lpae        4.4.0.103.108
  linux-image-kvm                 4.4.0.1012.12
  linux-image-lowlatency          4.4.0.103.108
  linux-image-powerpc-e500mc      4.4.0.103.108
  linux-image-powerpc-smp         4.4.0.103.108
  linux-image-powerpc64-emb       4.4.0.103.108
  linux-image-powerpc64-smp       4.4.0.103.108
  linux-image-raspi2              4.4.0.1079.79
  linux-image-snapdragon          4.4.0.1081.73

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3509-1
  CVE-2017-1000405, CVE-2017-12193, CVE-2017-16643, CVE-2017-16939

Package Information:
  https://launchpad.net/ubuntu/+source/linux/4.4.0-103.126
  https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1043.52
  https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1012.17
  https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1079.87
  https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1081.86

- ----------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3509-2
December 07, 2017

linux-lts-xenial, linux-aws vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty

Details:

USN-3509-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 16.04 LTS for Ubuntu
14.04 LTS.

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
implementation in the Linux kernel sometimes did not properly handle adding
a new entry. A local attacker could use this to cause a denial of service
(system crash). (CVE-2017-12193)

Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
driver for the Linux kernel. A physically proximate attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2017-16643)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  linux-image-4.4.0-1005-aws      4.4.0-1005.5
  linux-image-4.4.0-103-generic   4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-generic-lpae  4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-lowlatency  4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-powerpc-e500mc  4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-powerpc-smp  4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-powerpc64-emb  4.4.0-103.126~14.04.1
  linux-image-4.4.0-103-powerpc64-smp  4.4.0-103.126~14.04.1
  linux-image-aws                 4.4.0.1005.5
  linux-image-generic-lpae-lts-xenial  4.4.0.103.86
  linux-image-generic-lts-xenial  4.4.0.103.86
  linux-image-lowlatency-lts-xenial  4.4.0.103.86
  linux-image-powerpc-e500mc-lts-xenial  4.4.0.103.86
  linux-image-powerpc-smp-lts-xenial  4.4.0.103.86
  linux-image-powerpc64-emb-lts-xenial  4.4.0.103.86
  linux-image-powerpc64-smp-lts-xenial  4.4.0.103.86

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3509-2
  https://www.ubuntu.com/usn/usn-3509-1
  CVE-2017-1000405, CVE-2017-12193, CVE-2017-16643, CVE-2017-16939

Package Information:
  https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1005.5
  https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-103.126~14.04.1

- ------------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3510-1
December 08, 2017

linux vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux: Linux kernel

Details:

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  linux-image-3.13.0-137-generic  3.13.0-137.186
  linux-image-3.13.0-137-generic-lpae  3.13.0-137.186
  linux-image-3.13.0-137-lowlatency  3.13.0-137.186
  linux-image-3.13.0-137-powerpc-e500  3.13.0-137.186
  linux-image-3.13.0-137-powerpc-e500mc  3.13.0-137.186
  linux-image-3.13.0-137-powerpc-smp  3.13.0-137.186
  linux-image-3.13.0-137-powerpc64-emb  3.13.0-137.186
  linux-image-3.13.0-137-powerpc64-smp  3.13.0-137.186
  linux-image-generic             3.13.0.137.146
  linux-image-generic-lpae        3.13.0.137.146
  linux-image-lowlatency          3.13.0.137.146
  linux-image-powerpc-e500        3.13.0.137.146
  linux-image-powerpc-e500mc      3.13.0.137.146
  linux-image-powerpc-smp         3.13.0.137.146
  linux-image-powerpc64-emb       3.13.0.137.146
  linux-image-powerpc64-smp       3.13.0.137.146

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3510-1
  CVE-2017-1000405, CVE-2017-16939

Package Information:
  https://launchpad.net/ubuntu/+source/linux/3.13.0-137.186

- ------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3510-2
December 08, 2017

linux-lts-trusty vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
- - linux-lts-trusty: Linux hardware enablement kernel from Trusty for Precise ESM

Details:

USN-3510-1 fixed vulnerabilities in the Linux kernel for Ubuntu 14.04
LTS. This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 14.04 LTS for Ubuntu
12.04 ESM.

Mohamed Ghannam discovered that a use-after-free vulnerability existed in
the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
use this to cause a denial of service (system crash) or possibly execute
arbitrary code. (CVE-2017-16939)

It was discovered that the Linux kernel did not properly handle copy-on-
write of transparent huge pages. A local attacker could use this to cause a
denial of service (application crashes) or possibly gain administrative
privileges. (CVE-2017-1000405)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
  linux-image-3.13.0-137-generic  3.13.0-137.186~precise1
  linux-image-3.13.0-137-generic-lpae  3.13.0-137.186~precise1
  linux-image-generic-lpae-lts-trusty  3.13.0.137.127
  linux-image-generic-lts-trusty  3.13.0.137.127

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3510-2
  https://www.ubuntu.com/usn/usn-3510-1
  CVE-2017-1000405, CVE-2017-16939

- ------------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3509-3
December 15, 2017

linux, linux-aws, linux-kvm, linux-raspi2 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 16.04 LTS

Summary:

USN-3509-1 introduced a regression in the Linux kernel for Ubuntu 16.04 LTS.

Software Description:
- - linux: Linux kernel
- - linux-aws: Linux kernel for Amazon Web Services (AWS) systems
- - linux-kvm: Linux kernel for cloud environments
- - linux-raspi2: Linux kernel for Raspberry Pi 2

Details:

USN-3509-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04
LTS. Unfortunately, it also introduced a regression that prevented the
Ceph network filesystem from being used. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Mohamed Ghannam discovered that a use-after-free vulnerability existed in
 the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
 use this to cause a denial of service (system crash) or possibly execute
 arbitrary code. (CVE-2017-16939)

 It was discovered that the Linux kernel did not properly handle copy-on-
 write of transparent huge pages. A local attacker could use this to cause a
 denial of service (application crashes) or possibly gain administrative
 privileges. (CVE-2017-1000405)

 Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
 implementation in the Linux kernel sometimes did not properly handle adding
 a new entry. A local attacker could use this to cause a denial of service
 (system crash). (CVE-2017-12193)

 Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
 driver for the Linux kernel. A physically proximate attacker could use this
 to cause a denial of service (system crash) or possibly execute arbitrary
 code. (CVE-2017-16643)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
  linux-image-4.4.0-1013-kvm      4.4.0-1013.18
  linux-image-4.4.0-104-generic   4.4.0-104.127
  linux-image-4.4.0-104-generic-lpae  4.4.0-104.127
  linux-image-4.4.0-104-lowlatency  4.4.0-104.127
  linux-image-4.4.0-104-powerpc-e500mc  4.4.0-104.127
  linux-image-4.4.0-104-powerpc-smp  4.4.0-104.127
  linux-image-4.4.0-104-powerpc64-emb  4.4.0-104.127
  linux-image-4.4.0-104-powerpc64-smp  4.4.0-104.127
  linux-image-4.4.0-1044-aws      4.4.0-1044.53
  linux-image-4.4.0-1080-raspi2   4.4.0-1080.88
  linux-image-aws                 4.4.0.1044.46
  linux-image-generic             4.4.0.104.109
  linux-image-generic-lpae        4.4.0.104.109
  linux-image-kvm                 4.4.0.1013.13
  linux-image-lowlatency          4.4.0.104.109
  linux-image-powerpc-e500mc      4.4.0.104.109
  linux-image-powerpc-smp         4.4.0.104.109
  linux-image-powerpc64-emb       4.4.0.104.109
  linux-image-powerpc64-smp       4.4.0.104.109
  linux-image-raspi2              4.4.0.1080.80

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3509-3
  https://www.ubuntu.com/usn/usn-3509-1
  https://launchpad.net/bugs/1737033

Package Information:
  https://launchpad.net/ubuntu/+source/linux/4.4.0-104.127
  https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1044.53
  https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1013.18
  https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1080.88

- -----BEGIN PGP SIGNATURE-----

iQIcBAABCgAGBQJaM5KcAAoJEC8Jno0AXoH0uwMP/3wE/W24bggaOtIiqGP1+2fZ
6ctSRLsyPu57Vr4AxQ2Dxe4OIUJv2kVcori6UhPqaE1EDJ2py4QdHfqws1Sch2G4
Oxm5IhSTBTWGddaN0m3s8EWtIC4OZFS4L4T9ecrtxdqG8RXpVU5LPy6eRBXNIwUp
YWUxvGcaPdWOVHbAYCjfQVrpJBSOSP0BvjsQN1hMHS+zY8Dka4HfKmwg902QxeUC
tJq36SC9zlrRdlapqK7CNXK+4fye23OuRBD6+XPWZXcbDNJk4XncnQ4QbX5Guh1Z
QfF0X36jXax8Z+thhTAMs6ue92itv7aO770SPn4AvjXZTTUET/LGGfuWIIFmFBcD
AfPUTkmfYNtesx3gyheRWqyJaPNDX2/5uYpwF6/eDQjWAMPhlY7iblp9zpgsiKgl
MhbJyHSmTP7hKVrVG/OEsZ+hAdfpM63+UBVRFkEKppaLz+ScV2an1DPJTmfjsuga
gPfZ3ocbT0bgapOyt2OERpZ1dDaPXKH7g2E6sqM5B7WRG796KI8KfV1SN1k+6a4F
Cka8VgA74spj64xMMRHmoctxdCqV9t8txbLDsHFvHYbULcQhQnbeO5gmEoxjsIAn
g2XXqfm4iXeGm/mcHhEIW4aEfY5leluwPKfJc+bJLWPFBq0ldygFQxtay2pmglBz
zo0BljUJSLomEWrNWNY+
=vyGB
- -----END PGP SIGNATURE-----

- --------------------------------------------------------------------------------

==========================================================================
Ubuntu Security Notice USN-3509-4
December 15, 2017

linux-lts-xenial, linux-aws regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- - Ubuntu 14.04 LTS

Summary:

USN-3509-2 introduced a regression in the Linux HWE kernel for Ubuntu 14.04 LTS.

Software Description:
- - linux-lts-xenial: Linux hardware enablement kernel from Xenial for Trusty
- - linux-aws: Linux kernel for Amazon Web Services (AWS) systems

Details:

USN-3509-2 fixed vulnerabilities in the Linux Hardware Enablement
kernel for Ubuntu 14.04 LTS.  Unfortunately, it also introduced a
regression that prevented the Ceph network filesystem from being
used. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Mohamed Ghannam discovered that a use-after-free vulnerability existed in
 the Netlink subsystem (XFRM) in the Linux kernel. A local attacker could
 use this to cause a denial of service (system crash) or possibly execute
 arbitrary code. (CVE-2017-16939)

 It was discovered that the Linux kernel did not properly handle copy-on-
 write of transparent huge pages. A local attacker could use this to cause a
 denial of service (application crashes) or possibly gain administrative
 privileges. (CVE-2017-1000405)

 Fan Wu, Haoran Qiu, and Shixiong Zhao discovered that the associative array
 implementation in the Linux kernel sometimes did not properly handle adding
 a new entry. A local attacker could use this to cause a denial of service
 (system crash). (CVE-2017-12193)

 Andrey Konovalov discovered an out-of-bounds read in the GTCO digitizer USB
 driver for the Linux kernel. A physically proximate attacker could use this
 to cause a denial of service (system crash) or possibly execute arbitrary
 code. (CVE-2017-16643)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
  linux-image-4.4.0-1006-aws      4.4.0-1006.6
  linux-image-4.4.0-104-generic   4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-generic-lpae  4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-lowlatency  4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-powerpc-e500mc  4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-powerpc-smp  4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-powerpc64-emb  4.4.0-104.127~14.04.1
  linux-image-4.4.0-104-powerpc64-smp  4.4.0-104.127~14.04.1
  linux-image-aws                 4.4.0.1006.6
  linux-image-generic-lpae-lts-xenial  4.4.0.104.87
  linux-image-generic-lts-xenial  4.4.0.104.87
  linux-image-lowlatency-lts-xenial  4.4.0.104.87
  linux-image-powerpc-e500mc-lts-xenial  4.4.0.104.87
  linux-image-powerpc-smp-lts-xenial  4.4.0.104.87
  linux-image-powerpc64-emb-lts-xenial  4.4.0.104.87
  linux-image-powerpc64-smp-lts-xenial  4.4.0.104.87

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
  https://www.ubuntu.com/usn/usn-3509-4
  https://www.ubuntu.com/usn/usn-3509-2
  https://www.ubuntu.com/usn/usn-3509-1
  https://launchpad.net/bugs/1737033

Package Information:
  https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1006.6
  https://launchpad.net/ubuntu/+source/linux-lts-xenial/4.4.0-104.127~14.04.1

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBWjdAT4x+lLeg9Ub1AQhZ5BAAgkN806PoGQbljXD5u1kVflNSWkvO0jTG
y2SCgedGlHdXimKjbyc6JWfPPJ6hLAuEcXQrWUuNDuBC/YJY3AQLsnkOc4RMC1tH
eKg5X+RyLaNGFteKkb9HfhM59Vx2pNMgmaDwqsarvK48tLge15rNaBzA6HLtnN6K
Gi1b6jrQ9vX0eYpDk+FMz3cA/8vckHR6bE5lKTzqqBD4456CkRkcSClYwlexls5o
ZCpjgjcHi+kIFGwkU/dQB7Z89yMdnRcgD93kd2sqqyhsqSafQb1aa7Krl9t26LhE
n3XHBAkuvXVjVUNxjNbW2868rN8M0Yey+H39iL0ya5HuXkjmN/tXkQC7dt5oHJUL
et1u4bvkHmW2FeCOSlVSNQkCA3ZEmFGoFQRr0rO2S4HwziZDR+69Tb4AJ28MKCiZ
RlQG2qtdf+5Lk5hCS8M0VK7rSFG+H6owr9ftIL6DPsxHcSq9xxk/9tXGdLt9fKcw
wb0bw2+9LdtcTw+T8bYSVPswGDsnjASa3zgFa/S/49MeKKLpwEIppco7sn63w2J/
m07CsSFWpezx924r0tcHaD5OVad1Hq/jQltnoYX70aEaR+gO0vdexAo/c3HRlbcg
SDDYEf4GVOdDPaOxR3L8VpxGoDMl/utmQH9RbO25BcLl/ubVtMUkBn2/ZcGw48rd
eF+60z5LJwg=
=370h
-----END PGP SIGNATURE-----

« Back to bulletins