Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

LSN-0074-1: Kernel Live Patch Security Notice

26 January 2021

Several security issues were fixed in the kernel.

Releases

Software Description

  • aws - Linux kernel for Amazon Web Services (AWS) systems - (>= 5.4.0-1009, >= 4.4.0-1098)
  • aws-fips - Linux FIPS kernel for Amazon Web Services (AWS) systems - (>= 4.15.0-2030, >= 4.15.0-2030)
  • azure - Linux kernel for Microsoft Azure Cloud systems - (>= 5.4.0-1010, >= 4.15.0-1078)
  • azure-fips - Linux FIPS kernel for Microsoft Azure Cloud systems - (>= 4.15.0-2012)
  • fips - Linux FIPS kernel - (>= 4.15.0-1045, >= 4.4.0-1049)
  • gcp - Linux kernel for Google Cloud Platform (GCP) systems - (>= 5.4.0-1009)
  • generic-4.15 - Linux kernel - (>= 4.15.0-69)
  • generic-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
  • generic-5.4 - Linux kernel - (>= 5.4.0-26)
  • gkeop - Linux kernel for Google Container Engine (GKE) systems - (>= 5.4.0-1009)
  • gkeop-5.4 - Linux kernel for Google Container Engine (GKE) systems - (>= 5.4.0-1007, >= 5.4.0-1007)
  • lowlatency-4.15 - Linux kernel - (>= 4.15.0-69)
  • lowlatency-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
  • lowlatency-5.4 - Linux kernel - (>= 5.4.0-26)
  • oem - Linux kernel for OEM systems - (>= 4.15.0-1063)

Details

Elena Petrova discovered that the pin controller device tree implementation
in the Linux kernel did not properly handle string references. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2020-0427)

Andy Nguyen discovered that the Bluetooth A2MP implementation in the Linux
kernel did not properly initialize memory in some situations. A physically
proximate remote attacker could use this to expose sensitive information
(kernel memory). (CVE-2020-12352)

It was discovered that the GENEVE tunnel implementation in the Linux kernel
when combined with IPSec did not properly select IP routes in some
situations. An attacker could use this to expose sensitive information
(unencrypted network traffic). (CVE-2020-25645)

It was discovered that the LIO SCSI target implementation in the Linux
kernel performed insufficient identifier checking in certain XCOPY
requests. An attacker with access to at least one LUN in a multiple
backstore environment could use this to expose sensitive information or
modify data. (CVE-2020-28374)

Checking update status

The problem can be corrected in these Livepatch versions:

Kernel type 20.04 18.04 16.04 14.04
aws 74.1 74.1 74.1
aws-fips 74.1
azure 74.1 74.1
azure-fips 74.1
fips 74.1 74.1
gcp 74.1
generic-4.15 74.1
generic-4.4 74.1 74.1
generic-5.4 74.1
gkeop 74.1
gkeop-5.4
lowlatency-4.15 74.1
lowlatency-4.4 74.1 74.1
lowlatency-5.4 74.1
oem 74.1

To check your kernel type and Livepatch version, enter this command:

canonical-livepatch status