Linux Kernel and Zsh Updates for Ubuntu Linux
Posted on: 09/12/2018 07:25 AM

The following updates has been released for Ubuntu Linux:

LSN-0043-1: Linux kernel vulnerability
USN-3764-1: Zsh vulnerabilities

LSN-0043-1: Linux kernel vulnerability
==========================================================================
Kernel Live Patch Security Notice 0043-1
September 11, 2018

linux vulnerability
==========================================================================

A security issue affects these releases of Ubuntu:

| Series | Base kernel | Arch | flavors |
|------------------+--------------+----------+------------------|
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency |

Summary:

Several security issues were fixed in the kernel.

Software Description:
- linux: Linux kernel

Details:

Piotr Gabriel Kosinski and Daniel Shapira discovered a stack-based buffer
overflow in the CDROM driver implementation of the Linux kernel. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2018-11506)

Jann Horn discovered that the ext4 filesystem implementation in the Linux
kernel did not properly keep xattr information consistent in some
situations. An attacker could use this to construct a malicious ext4 image
that, when mounted, could cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2018-11412)

Silvio Cesare discovered that the generic VESA frame buffer driver in the
Linux kernel contained an integer overflow. A local attacker could use this
to cause a denial of service (system crash) or possibly execute arbitrary
code. (CVE-2018-13406)

It was discovered that the Linux kernel did not properly handle setgid file
creation when performed by a non-member of the group. A local attacker
could use this to gain elevated privileges. (CVE-2018-13405)

Shankara Pailoor discovered that the JFS filesystem implementation in the
Linux kernel contained a buffer overflow when handling extended attributes.
A local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2018-12233)

Update instructions:

The problem can be corrected by updating your livepatches to the following
versions:

| Kernel | Version | flavors |
|--------------------------+----------+--------------------------|
| 4.4.0-133.159 | 43.1 | generic, lowlatency |
| 4.4.0-133.159~14.04.1 | 43.1 | lowlatency, generic |
| 4.15.0-32.35 | 43.1 | lowlatency, generic |
| 4.15.0-32.35~16.04.1 | 43.4 | generic, lowlatency |

References:
CVE-2018-11506, CVE-2018-11412, CVE-2018-13406, CVE-2018-13405,
CVE-2018-12233

--



USN-3764-1: Zsh vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3764-1
September 11, 2018

zsh vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Zsh could be made to execute arbitrary code if it received
a specially crafted script.

Software Description:
- zsh: shell with lots of features

Details:

It was discovered that Zsh incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code.
(CVE-2018-0502, CVE-2018-13259)

Richard Maciel Costa discovered that Zsh incorrectly handled certain
scripts. An attacker could possibly use this issue to execute arbitrary
code. (CVE-2018-1100)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
  zsh 5.4.2-3ubuntu3.1

Ubuntu 16.04 LTS:
  zsh 5.1.1-1ubuntu2.3

Ubuntu 14.04 LTS:
  zsh 5.0.2-3ubuntu6.3

After a standard system update you need to restart Zsh to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3764-1
  CVE-2018-0502, CVE-2018-1100, CVE-2018-13259

Package Information:
  https://launchpad.net/ubuntu/+source/zsh/5.4.2-3ubuntu3.1
  https://launchpad.net/ubuntu/+source/zsh/5.1.1-1ubuntu2.3
  https://launchpad.net/ubuntu/+source/zsh/5.0.2-3ubuntu6.3






Printed from Linux Compatible (https://www.linuxcompatible.org/news/story/linux_kernel_and_zsh_updates_for_ubuntu_linux.html)