Executive Summary

Summary
Title Linux kernel vulnerabilities
Informations
NameUSN-3910-1First vendor Publication2019-03-15
VendorUbuntuLast vendor Modification2019-03-15
Severity (Vendor) N/ARevisionN/A

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score4.9Attack RangeLocal
Cvss Impact Score6.9Attack ComplexityLow
Cvss Expoit Score3.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in the Linux kernel.

Software Description: - linux: Linux kernel - linux-aws: Linux kernel for Amazon Web Services (AWS) systems - linux-kvm: Linux kernel for cloud environments - linux-raspi2: Linux kernel for Raspberry Pi 2 - linux-snapdragon: Linux kernel for Snapdragon processors

Details:

It was discovered that the f2fs filesystem implementation in the Linux kernel did not handle the noflush_merge mount option correctly. An attacker could use this to cause a denial of service (system crash). (CVE-2017-18241)

It was discovered that the procfs filesystem did not properly handle processes mapping some memory elements onto files. A local attacker could use this to block utilities that examine the procfs filesystem to report operating system state, such as ps(1). (CVE-2018-1120)

Hui Peng and Mathias Payer discovered that the Option USB High Speed driver in the Linux kernel did not properly validate metadata received from the device. A physically proximate attacker could use this to cause a denial of service (system crash). (CVE-2018-19985)

It was discovered that multiple integer overflows existed in the hugetlbfs implementation in the Linux kernel. A local attacker could use this to cause a denial of service (system crash). (CVE-2018-7740)

Jann Horn discovered a race condition in the fork() system call in the Linux kernel. A local attacker could use this to gain access to services that cache authorizations. (CVE-2019-6133)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 16.04 LTS:
linux-image-4.4.0-1041-kvm 4.4.0-1041.47
linux-image-4.4.0-1077-aws 4.4.0-1077.87
linux-image-4.4.0-1104-raspi2 4.4.0-1104.112
linux-image-4.4.0-1108-snapdragon 4.4.0-1108.113
linux-image-4.4.0-143-generic 4.4.0-143.169
linux-image-4.4.0-143-generic-lpae 4.4.0-143.169
linux-image-4.4.0-143-lowlatency 4.4.0-143.169
linux-image-4.4.0-143-powerpc-e500mc 4.4.0-143.169
linux-image-4.4.0-143-powerpc-smp 4.4.0-143.169
linux-image-4.4.0-143-powerpc64-emb 4.4.0-143.169
linux-image-4.4.0-143-powerpc64-smp 4.4.0-143.169
linux-image-aws 4.4.0.1077.80
linux-image-generic 4.4.0.143.151
linux-image-generic-lpae 4.4.0.143.151
linux-image-kvm 4.4.0.1041.41
linux-image-lowlatency 4.4.0.143.151
linux-image-powerpc-e500mc 4.4.0.143.151
linux-image-powerpc-smp 4.4.0.143.151
linux-image-powerpc64-emb 4.4.0.143.151
linux-image-powerpc64-smp 4.4.0.143.151
linux-image-raspi2 4.4.0.1104.104
linux-image-snapdragon 4.4.0.1108.100
linux-image-virtual 4.4.0.143.151

After a standard system update you need to reboot your computer to make all the necessary changes.

ATTENTION: Due to an unavoidable ABI change the kernel updates have been given a new version number, which requires you to recompile and reinstall all third party kernel modules you might have installed. Unless you manually uninstalled the standard kernel metapackages (e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual, linux-powerpc), a standard system upgrade will automatically perform this as well.

References:
https://usn.ubuntu.com/usn/usn-3910-1
CVE-2017-18241, CVE-2018-1120, CVE-2018-19985, CVE-2018-7740,
CVE-2019-6133

Package Information:
https://launchpad.net/ubuntu/+source/linux/4.4.0-143.169
https://launchpad.net/ubuntu/+source/linux-aws/4.4.0-1077.87
https://launchpad.net/ubuntu/+source/linux-kvm/4.4.0-1041.47
https://launchpad.net/ubuntu/+source/linux-raspi2/4.4.0-1104.112
https://launchpad.net/ubuntu/+source/linux-snapdragon/4.4.0-1108.113

Original Source

Url : http://www.ubuntu.com/usn/USN-3910-1

CWE : Common Weakness Enumeration

%idName
40 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer
20 %CWE-476NULL Pointer Dereference
20 %CWE-284Access Control (Authorization) Issues
20 %CWE-125Out-of-bounds Read

CPE : Common Platform Enumeration

TypeDescriptionCount
Application1
Application1
Application1
Application1
Os5
Os3
Os3153
Os2
Os2
Os2
Os1
Os1
Os2

Nessus® Vulnerability Scanner

DateDescription
2019-01-03Name : The remote Fedora host is missing a security update.
File : fedora_2018-8ce90c8b24.nasl - Type : ACT_GATHER_INFO
2018-12-11Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2018-1406.nasl - Type : ACT_GATHER_INFO
2018-11-16Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2018-3083.nasl - Type : ACT_GATHER_INFO
2018-09-18Name : The remote EulerOS Virtualization host is missing multiple security updates.
File : EulerOS_SA-2018-1280.nasl - Type : ACT_GATHER_INFO
2018-08-17Name : The remote PhotonOS host is missing multiple security updates.
File : PhotonOS_PHSA-2018-1_0-0135.nasl - Type : ACT_GATHER_INFO
2018-07-20Name : The remote Debian host is missing a security update.
File : debian_DLA-1423.nasl - Type : ACT_GATHER_INFO
2018-07-18Name : The remote Virtuozzo host is missing multiple security updates.
File : Virtuozzo_VZA-2018-048.nasl - Type : ACT_GATHER_INFO
2018-07-16Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-045.nasl - Type : ACT_GATHER_INFO
2018-07-16Name : The remote Virtuozzo host is missing a security update.
File : Virtuozzo_VZA-2018-046.nasl - Type : ACT_GATHER_INFO
2018-06-12Name : The remote Amazon Linux 2 host is missing a security update.
File : al2_ALAS-2018-1038.nasl - Type : ACT_GATHER_INFO
2018-06-12Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2018-1038.nasl - Type : ACT_GATHER_INFO
2018-05-31Name : The remote Gentoo host is missing one or more security-related patches.
File : gentoo_GLSA-201805-14.nasl - Type : ACT_GATHER_INFO
2018-05-29Name : The remote Fedora host is missing a security update.
File : fedora_2018-93c2e74446.nasl - Type : ACT_GATHER_INFO
2018-05-03Name : The remote Debian host is missing a security update.
File : debian_DLA-1369.nasl - Type : ACT_GATHER_INFO
2018-05-02Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4187.nasl - Type : ACT_GATHER_INFO
2018-05-02Name : The remote Debian host is missing a security-related update.
File : debian_DSA-4188.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
0
1
2
DateInformations
2019-03-21 21:21:44
  • Multiple Updates
2019-03-16 00:21:43
  • Multiple Updates
2019-03-16 00:18:54
  • First insertion