Ubuntu 6334 Published by

A Linux kernel security update has been released for Ubuntu Linux 14.04 ESM, 16.04 LTS, 18.04 LTS, and 20.04 LTS.



LSN-0074-1: Linux kernel vulnerability


Linux kernel vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 ESM

Summary

Several security issues were fixed in the kernel.

Software Description

- linux - Linux kernel
- linux-aws - Linux kernel for Amazon Web Services (AWS) systems - linux-aws-fips - Linux FIPS kernel for Amazon Web Services (AWS) systems
- linux-azure - Linux kernel for Microsoft Azure Cloud systems - linux-azure-fips - Linux FIPS kernel for Microsoft Azure Cloud systems
- linux-fips - Linux FIPS kernel
- linux-gcp - Linux kernel for Google Cloud Platform (GCP) systems - linux-gke - Linux kernel for Google Container Engine (GKE) systems - linux-gkeop - Linux kernel for Google Container Engine (GKE) On- Prem systems
- linux-oem - Linux kernel for OEM systems

Details

Elena Petrova discovered that the pin controller device tree implementation in the Linux kernel did not properly handle string references. A local attacker could use this to expose sensitive information (kernel memory). (CVE-2020-0427)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux kernel did not properly initialize memory in some situations. A physically proximate remote attacker could use this to expose sensitive information (kernel memory). (CVE-2020-12352)

It was discovered that the GENEVE tunnel implementation in the Linux kernel when combined with IPSec did not properly select IP routes in some situations. An attacker could use this to expose sensitive information (unencrypted network traffic). (CVE-2020-25645)

It was discovered that the LIO SCSI target implementation in the Linux kernel performed insufficient identifier checking in certain XCOPY requests. An attacker with access to at least one LUN in a multiple backstore environment could use this to expose sensitive information or modify data. (CVE-2020-28374)

Update instructions

The problem can be corrected by updating your kernel livepatch to the following versions:

Ubuntu 18.04 LTS
aws - 74.1
aws-fips - 74.1
azure-fips - 74.1
fips - 74.1
generic - 74.1
gke - 74.1
gkeop - 74.1
lowlatency - 74.1
oem - 74.1

Ubuntu 20.04 LTS
aws - 74.1
azure - 74.1
gcp - 74.1
generic - 74.1
gke - 74.1
lowlatency - 74.1

Ubuntu 16.04 LTS
aws - 74.1
azure - 74.1
fips - 74.1
generic - 74.1
lowlatency - 74.1

Ubuntu 14.04 ESM
generic - 74.1
lowlatency - 74.1

Support Information

Kernels older than the levels listed below do not receive livepatch updates. If you are running a kernel version earlier than the one listed
below, please upgrade your kernel as soon as possible.

Ubuntu 18.04 LTS
linux-aws-fips - 4.15.0-2030
linux-aws - 4.15.0-1054
linux-azure-fips - 4.15.0-2012
linux-fips - 4.15.0-1045
linux-gke-4.15 - 4.15.0-1076
linux-gke-5.4 - 5.4.0-1009
linux-gkeop-5.4 - 5.4.0-1007
linux-hwe-5.4 - 5.4.0-26
linux-oem - 4.15.0-1063
linux - 4.15.0-69

Ubuntu 20.04 LTS
linux-aws - 5.4.0-1009
linux-azure - 5.4.0-1010
linux-gcp - 5.4.0-1009
linux-gke - 5.4.0-1033
linux-gkeop - 5.4.0-1009
linux-oem - 5.4.0-26
linux - 5.4.0-26

Ubuntu 16.04 LTS
linux-aws - 4.4.0-1098
linux-azure - 4.15.0-1063
linux-azure - 4.15.0-1078
linux-fips - 4.4.0-1049
linux-hwe - 4.15.0-69
linux - 4.4.0-168

Ubuntu 14.04 ESM
linux-lts-xenial - 4.4.0-168

References

- CVE-2020-0427
- CVE-2020-12352
- CVE-2020-25645
- CVE-2020-28374