[USN-3820-3] Linux kernel (Azure) vulnerabilities

protocol=”application/pgp-signature”; boundary=”AsKt9WDFSpw8OJmf”
Content-Disposition: inline

–AsKt9WDFSpw8OJmf

Content-Disposition: inline

==========================================================================
Ubuntu Security Notice USN-3820-3
November 14, 2018

linux-azure vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description:
– linux-azure: Linux kernel for Microsoft Azure Cloud systems

Details:

Felix Wilhelm discovered that the Xen netback driver in the Linux kernel
did not properly perform input validation in some situations. An attacker
could use this to cause a denial of service (system crash) or possibly
execute arbitrary code. (CVE-2018-15471)

It was discovered that the generic SCSI driver in the Linux kernel did not
properly enforce permissions on kernel memory access. A local attacker
could use this to expose sensitive information or possibly elevate
privileges. (CVE-2017-13168)

It was discovered that an integer overflow existed in the CD-ROM driver of
the Linux kernel. A local attacker could use this to expose sensitive
information (kernel memory). (CVE-2018-16658)

It was discovered that an integer overflow existed in the HID Bluetooth
implementation in the Linux kernel that could lead to a buffer overwrite.
An attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2018-9363)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 14.04 LTS:
linux-image-4.15.0-1031-azure 4.15.0-1031.32~14.04.1+signed1
linux-image-azure 4.15.0.1031.18

After a standard system update you need to reboot your computer to make
all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well.

References:
https://usn.ubuntu.com/usn/usn-3820-3
https://usn.ubuntu.com/usn/usn-3820-1
CVE-2017-13168, CVE-2018-15471, CVE-2018-16658, CVE-2018-9363

Package Information:
https://launchpad.net/ubuntu/+source/linux-azure/4.15.0-1031.32~14.04.1

–AsKt9WDFSpw8OJmf

—–BEGIN PGP SIGNATURE—–
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=/iKG
—–END PGP SIGNATURE—–

–AsKt9WDFSpw8OJmf–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK