LSN-0072-1: Kernel Live Patch Security Notice
14 October 2020
Several security issues were fixed in the kernel.
Releases
Software Description
- aws - Linux kernel for Amazon Web Services (AWS) systems - (>= 4.15.0-1054, >= 5.4.0-1009, >= 5.4.0-1009, >= 4.4.0-1098)
- azure - Linux kernel for Microsoft Azure Cloud systems - (>= 5.4.0-1010, >= 5.4.0-1010)
- gcp - Linux kernel for Google Cloud Platform (GCP) systems - (>= 5.4.0-1009, >= 5.4.0-1009)
- generic-4.15 - Linux kernel - (>= 4.15.0-69)
- generic-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
- generic-5.4 - Linux kernel - (>= 5.4.0-26, >= 5.4.0-26)
- lowlatency-4.15 - Linux kernel - (>= 4.15.0-69)
- lowlatency-4.4 - Linux kernel - (>= 4.4.0-168, >= 4.4.0-168)
- lowlatency-5.4 - Linux kernel - (>= 5.4.0-26, >= 5.4.0-26)
- oem - Linux kernel for OEM systems - (>= 4.15.0-1063)
Details
It was discovered that the F2FS file system implementation in the Linux
kernel did not properly perform bounds checking on xattrs in some
situations. A local attacker could possibly use this to expose sensitive
information (kernel memory). (CVE-2020-0067)
It was discovered that the Serial CAN interface driver in the Linux kernel
did not properly initialize data. A local attacker could use this to expose
sensitive information (kernel memory). (CVE-2020-11494)
Mauricio Faria de Oliveira discovered that the aufs implementation in the
Linux kernel improperly managed inode reference counts in the
vfsub_dentry_open() method. A local attacker could use this vulnerability
to cause a denial of service. (CVE-2020-11935)
Piotr Krysiuk discovered that race conditions existed in the file system
implementation in the Linux kernel. A local attacker could use this to
cause a denial of service (system crash). (CVE-2020-12114)
Or Cohen discovered that the AF_PACKET implementation in the Linux kernel
did not properly perform bounds checking in some situations. A local
attacker could use this to cause a denial of service (system crash) or
possibly execute arbitrary code. (CVE-2020-14386)
Hador Manor discovered that the DCCP protocol implementation in the Linux
kernel improperly handled socket reuse, leading to a use-after-free
vulnerability. A local attacker could use this to cause a denial of service
(system crash) or possibly execute arbitrary code. (CVE-2020-16119)
Giuseppe Scrivano discovered that the overlay file system in the Linux
kernel did not properly perform permission checks in some situations. A
local attacker could possibly use this to bypass intended restrictions and
gain read access to restricted files. (CVE-2020-16120)
Checking update status
The problem can be corrected in these Livepatch versions:
Kernel type | 20.04 | 18.04 | 16.04 | 14.04 |
---|---|---|---|---|
aws | 72.2 | 72.1 | 72.1 | — |
azure | 72.2 | — | — | — |
gcp | 72.2 | — | — | — |
generic-4.15 | — | 72.1 | — | — |
generic-4.4 | — | — | 72.1 | 72.1 |
generic-5.4 | 72.2 | — | — | — |
lowlatency-4.15 | — | 72.1 | — | — |
lowlatency-4.4 | — | — | 72.1 | 72.1 |
lowlatency-5.4 | 72.2 | — | — | — |
oem | — | 72.1 | — | — |
To check your kernel type and Livepatch version, enter this command:
canonical-livepatch status